In Cybersecurity and Fashion, What’s Old Is New Again
February 22, 20248 min read 分钟阅读
Share
COMMENTARY
While distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they’re still happening regularly for a simple reason: They work. In early November 2023, OpenAI blamed a DDoS attack for intermittent ChatGPT issues, and one of the largest known denial-of-service attacks hit major internet companies in October. The same group of bad actors — Anonymous Sudan — has taken credit for both the ChatGPT attack as well as the one that hit Cloudflare in October.
While DDoS attacks historically stemmed from vulnerabilities in Internet protocols (e.g., SYN flood, Smurf attack), the focus later shifted to Internet of Things (IoT) devices. These new kids on the block were easy to infect through some combination of misconfiguration and zero-day exploits, and unfortunately, they still are. It’s time to take a closer look at why these attacks are back with a vengeance and how to make sure your organization’s anti-DDoS strategy is well-bolstered.
History Repeats Itself
Mirai, one of the largest-scale DDoS attacks back in 2016 and 2017, heralded a shift in attack methods that continues today. Bad actors launch attacks on device vulnerabilities, infect them en masse, and then use them to execute DDoS attacks. A vulnerability in a device will arise and be widely infected, leading to the “patch, rinse, repeat” cycle. Industry reports suggest DDoS overall is on the rise. One infrastructure company reported a 200% increase from 2022 to 2023.
Correlated with this rise in DDoS, CISA officials have reported a surge in zero-day exploits in the past six months and, together with the FBI, recently warned about the latest vulnerabilities in Atlassian solutions — potentially resulting in lots of vulnerable Internet-facing devices. That’s not to mention Cisco’s disclosure of a Web UI-based critical zero-day that infected more than 40,000 devices. What’s behind this surge? Unfortunately, new vulnerabilities will always crop up despite constant improvements. A lot of work goes into trying to make sure that doesn’t happen, but developing new technologies is hard and prone to human error.
The IoT Pain Point
Vulnerable IoT will continue to contribute to the rise in DDoS attacks. The ecosystem remains relatively unregulated; there aren’t yet minimum-security controls before a device can come online. There’s more momentum for the concept of “security by design,” but it’s still early days. So, there’s nothing that requires a device manufacturer to have good security hygiene.
Meanwhile, new tech vendors without experience in securing devices are entering the market — and their devices are coming online in waves. That means there will be more DDoS attacks targeting IoT devices. This is going to make security painful for a while.
The Dark Side of New Protocols
IoT threats aren’t the only concern on the DDoS front. In efforts to upgrade existing Internet infrastructure, new network protocols have been developed to enhance the performance of aging protocols. HTTP/2 was developed to improve many of the shortcomings of the original HTTP protocol, but new flaws in this protocol have made many web servers vulnerable to a new “rapid reset” attack. This vulnerability will likely linger for years until vulnerable Web servers are patched or upgraded. This specific threat highlights the challenge of developing secure protocols, but this isn’t unique to HTTP/2. Every time a new Internet protocol is introduced, security pros gradually find and address new vulnerabilities. As a result, issues in newly developed or older network protocols will continue to enable new denial-of-service attacks.
Staying Ahead of the Curve
With DDoS and zero-days on the rise, cybersecurity professionals must take stronger steps to protect their organizations. In 2024, there’s an opportunity to take a closer look at your security policies and procedures, especially concerning the services and devices your organization uses.
The prevailing wisdom has moved beyond a castle-and-moat perspective to realizing that breaches are inevitable. The question is how quickly you can detect and deal with a breach once it happens. There have been cases where a breach has lasted a long time because companies didn’t know what to do or had to take drastic measures and take their systems offline.
A robust strategy for stopping DDoS attacks should address the following aspects:
1. Implement Scalable Infrastructure and Redundancy
Use load balancers to distribute traffic evenly across multiple servers. In a DDoS attack, traffic can be distributed across multiple resources, making it harder for attackers to overwhelm a single point of failure.
Leverage cloud-based DDoS mitigation services from providers like Akamai, AWS, Azure, Cloudflare, or Google. These services can absorb and filter malicious traffic before it reaches your infrastructure.
Design your network and infrastructure with failover mechanisms and redundancy to enable business continuity during an attack. This can involve having backup servers, data centers or service providers.
2. Employ Traffic Monitoring and Anomaly Detection
Continuously monitor your network traffic for unusual patterns and spikes in volume. Use tools and software that can detect anomalies in real time.
Use behavioral analysis to identify abnormal user behavior, such as a sudden increase in login attempts or requests from a single IP address.
Implement flow monitoring tools like NetFlow or sFlow to gain visibility into traffic flows and identify potential DDoS attacks.
3. Deploy Network Security Measures
Deploy firewalls and intrusion detection and prevention service (IDPS) devices to filter incoming traffic and detect and block malicious traffic patterns.
Use a content delivery network (CDN) to distribute and serve your content from multiple geographically distributed servers. CDNs can absorb a significant portion of traffic during an attack. Implement rate-limiting and traffic-shaping policies to throttle and control incoming traffic, preventing it from overwhelming your network.
As long as there is an Internet, bad actors will do everything they can to exploit its weaknesses. As 2024 approaches, businesses must take the uptick in DDoS and zero-day attacks seriously. If security leaders are tracking the risk, keeping an inventory of potentially vulnerable services and devices, and implementing the right security tooling and procedures outlined above, they stand a better fighting chance of mitigating the impact of DDoS and zero-days in the new year.
Source: [Finance Intelligence] The debate within the EU over the cybersecurity certification program has escalated once again, with 15 EU companies including Deutsche Telekom, France Telecom, and Airbus jointly boycotting a proposal that would allow unrestricted access to EU cloud data by US tech giants like Microsoft, Amazon, and Google. This event has once again …
The most widely used content management system on the Web relies heavily on plug-ins and add-on software — and that requires rigorous security measures at every level. What’s the best way to secure a WordPress website? The answer varies depending on whether you’re talking about sites hosted on WordPress.com (the hosting provider) or those running …
In a significant cybersecurity incident in 2023, Microsoft’s Exchange Online email service was compromised, affecting the accounts of 22 organizations and hundreds of individuals. Among the victims were high-ranking US government officials, including Commerce Secretary Gina Raimondo and US Ambassador to China Nicholas Burns. The breach was traced back to “Storm-0558”, a hacking group with …
In Cybersecurity and Fashion, What’s Old Is New Again
COMMENTARY
While distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they’re still happening regularly for a simple reason: They work. In early November 2023, OpenAI blamed a DDoS attack for intermittent ChatGPT issues, and one of the largest known denial-of-service attacks hit major internet companies in October. The same group of bad actors — Anonymous Sudan — has taken credit for both the ChatGPT attack as well as the one that hit Cloudflare in October.
While DDoS attacks historically stemmed from vulnerabilities in Internet protocols (e.g., SYN flood, Smurf attack), the focus later shifted to Internet of Things (IoT) devices. These new kids on the block were easy to infect through some combination of misconfiguration and zero-day exploits, and unfortunately, they still are. It’s time to take a closer look at why these attacks are back with a vengeance and how to make sure your organization’s anti-DDoS strategy is well-bolstered.
History Repeats Itself
Mirai, one of the largest-scale DDoS attacks back in 2016 and 2017, heralded a shift in attack methods that continues today. Bad actors launch attacks on device vulnerabilities, infect them en masse, and then use them to execute DDoS attacks. A vulnerability in a device will arise and be widely infected, leading to the “patch, rinse, repeat” cycle. Industry reports suggest DDoS overall is on the rise. One infrastructure company reported a 200% increase from 2022 to 2023.
Correlated with this rise in DDoS, CISA officials have reported a surge in zero-day exploits in the past six months and, together with the FBI, recently warned about the latest vulnerabilities in Atlassian solutions — potentially resulting in lots of vulnerable Internet-facing devices. That’s not to mention Cisco’s disclosure of a Web UI-based critical zero-day that infected more than 40,000 devices. What’s behind this surge? Unfortunately, new vulnerabilities will always crop up despite constant improvements. A lot of work goes into trying to make sure that doesn’t happen, but developing new technologies is hard and prone to human error.
The IoT Pain Point
Vulnerable IoT will continue to contribute to the rise in DDoS attacks. The ecosystem remains relatively unregulated; there aren’t yet minimum-security controls before a device can come online. There’s more momentum for the concept of “security by design,” but it’s still early days. So, there’s nothing that requires a device manufacturer to have good security hygiene.
Meanwhile, new tech vendors without experience in securing devices are entering the market — and their devices are coming online in waves. That means there will be more DDoS attacks targeting IoT devices. This is going to make security painful for a while.
The Dark Side of New Protocols
IoT threats aren’t the only concern on the DDoS front. In efforts to upgrade existing Internet infrastructure, new network protocols have been developed to enhance the performance of aging protocols. HTTP/2 was developed to improve many of the shortcomings of the original HTTP protocol, but new flaws in this protocol have made many web servers vulnerable to a new “rapid reset” attack. This vulnerability will likely linger for years until vulnerable Web servers are patched or upgraded. This specific threat highlights the challenge of developing secure protocols, but this isn’t unique to HTTP/2. Every time a new Internet protocol is introduced, security pros gradually find and address new vulnerabilities. As a result, issues in newly developed or older network protocols will continue to enable new denial-of-service attacks.
Staying Ahead of the Curve
With DDoS and zero-days on the rise, cybersecurity professionals must take stronger steps to protect their organizations. In 2024, there’s an opportunity to take a closer look at your security policies and procedures, especially concerning the services and devices your organization uses.
The prevailing wisdom has moved beyond a castle-and-moat perspective to realizing that breaches are inevitable. The question is how quickly you can detect and deal with a breach once it happens. There have been cases where a breach has lasted a long time because companies didn’t know what to do or had to take drastic measures and take their systems offline.
A robust strategy for stopping DDoS attacks should address the following aspects:
1. Implement Scalable Infrastructure and Redundancy
2. Employ Traffic Monitoring and Anomaly Detection
3. Deploy Network Security Measures
As long as there is an Internet, bad actors will do everything they can to exploit its weaknesses. As 2024 approaches, businesses must take the uptick in DDoS and zero-day attacks seriously. If security leaders are tracking the risk, keeping an inventory of potentially vulnerable services and devices, and implementing the right security tooling and procedures outlined above, they stand a better fighting chance of mitigating the impact of DDoS and zero-days in the new year.
Article origin: https://www.darkreading.com/cyberattacks-data-breaches/in-cybersecurity-whats-old-is-new-again
Related Posts
EU Cybersecurity Certification Program Controversy: Sovereignty vs. Openness
Source: [Finance Intelligence] The debate within the EU over the cybersecurity certification program has escalated once again, with 15 EU companies including Deutsche Telekom, France Telecom, and Airbus jointly boycotting a proposal that would allow unrestricted access to EU cloud data by US tech giants like Microsoft, Amazon, and Google. This event has once again …
Expert Tips to Keep WordPress Safe
The most widely used content management system on the Web relies heavily on plug-ins and add-on software — and that requires rigorous security measures at every level. What’s the best way to secure a WordPress website? The answer varies depending on whether you’re talking about sites hosted on WordPress.com (the hosting provider) or those running …
Microsoft Exchange Hit by Major Security Breach: “Storm-0558” Hacker Group Exploits Vulnerability, Compromising US Government Officials’ Accounts
In a significant cybersecurity incident in 2023, Microsoft’s Exchange Online email service was compromised, affecting the accounts of 22 organizations and hundreds of individuals. Among the victims were high-ranking US government officials, including Commerce Secretary Gina Raimondo and US Ambassador to China Nicholas Burns. The breach was traced back to “Storm-0558”, a hacking group with …