Cybersecurity: DDoS Attacks Knock Organizations Offline
Richard Hummel, a threat research lead at Netscout, a cybersecurity, service assurance and business analytics solution provider, discusses three prominent DDoS threat actors of 2021. Distributed Denial of Services (DDoS) extortion campaigns are typically custom-built attack techniques that threaten internet resources. The attacks have been directed at financial and travel industry sectors. However, Hummel said manufacturers of personal care products, energy providers, retail and IT-related vendors are also targeted.
Compromised machines, called Zombies or Handlers, send packets through the network to exhaust communication or computational resources. The variety and number of both the attacks and the defense approaches are overwhelming. That most of these threats do not materialize into actual attacks or are successfully mitigated can be no small comfort relative to the potential reliability risk for manufacturing plants.
The three DDoS attacks named in this video clip are:
- Lazarus Bear Armada: Attackers demand a ransom in exchange for stopping a DDoS attack. Extortionists targeted multiple verticals worldwide. An attack on the New Zealand Stock Exchange is one example.
- Fancy Lazarus: An extortionist campaign that targeted authoritative DNS servers of wireline broadband access ISPs in the UK and Scandinavia. The attack is characterized as “somewhat successful” due to the unpreparedness of a few network operators.
- REvil ransomware: An aggressive series of attacks masquerading as the REvil ransomware group targeted SIP/RTP VoIP operators in the U.K., Western Europe and North America. One VoIP wholesaler filed a form with the U.S. Securities and Exchange Commission (SEC) estimating the total cost of the DDoS attack at between $9 and $12 million.
Click here to access the Netscout Threat Intelligence Report.
Related Videos
Cybercrime Mitigation: Is Your Critical Infrastructure Secure?
Report: DDoS Cyberattacks Pile Pressure on Critical Manufacturing Sector
Digital Supply Chain: Cybersecurity Report Flags Clear and Present Danger
Related Article
About the Author

Rehana Begg
Editor-in-Chief, Machine Design
As Machine Design’s content lead, Rehana Begg is tasked with elevating the voice of the design and multi-disciplinary engineer in the face of digital transformation and engineering innovation. Begg has more than 24 years of editorial experience and has spent the past decade in the trenches of industrial manufacturing, focusing on new technologies, manufacturing innovation and business. Her B2B career has taken her from corporate boardrooms to plant floors and underground mining stopes, covering everything from automation & IIoT, robotics, mechanical design and additive manufacturing to plant operations, maintenance, reliability and continuous improvement. Begg holds an MBA, a Master of Journalism degree, and a BA (Hons.) in Political Science. She is committed to lifelong learning and feeds her passion for innovation in publishing, transparent science and clear communication by attending relevant conferences and seminars/workshops.
Follow Rehana Begg via the following social media handles:
X: @rehanabegg
LinkedIn: @rehanabegg and @MachineDesign