Cybersecurity: DDoS Attacks Knock Organizations Offline

March 22, 2022
On the cyberattack front, three particular extortion attempts attained prominence in 2021.

Richard Hummel, a threat research lead at Netscout, a cybersecurity, service assurance and business analytics solution provider, discusses three prominent DDoS threat actors of 2021. Distributed Denial of Services (DDoS) extortion campaigns are typically custom-built attack techniques that threaten internet resources. The attacks have been directed at financial and travel industry sectors. However, Hummel said manufacturers of personal care products, energy providers, retail and IT-related vendors are also targeted.

Compromised machines, called Zombies or Handlers, send packets through the network to exhaust communication or computational resources. The variety and number of both the attacks and the defense approaches are overwhelming. That most of these threats do not materialize into actual attacks or are successfully mitigated can be no small comfort relative to the potential reliability risk for manufacturing plants.

The three DDoS attacks named in this video clip are:

  • Lazarus Bear Armada: Attackers demand a ransom in exchange for stopping a DDoS attack. Extortionists targeted multiple verticals worldwide. An attack on the New Zealand Stock Exchange is one example.
  • Fancy Lazarus: An extortionist campaign that targeted authoritative DNS servers of wireline broadband access ISPs in the UK and Scandinavia. The attack is characterized as “somewhat successful” due to the unpreparedness of a few network operators.
  • REvil ransomware: An aggressive series of attacks masquerading as the REvil ransomware group targeted SIP/RTP VoIP operators in the U.K., Western Europe and North America. One VoIP wholesaler filed a form with  the U.S. Securities and Exchange Commission (SEC) estimating the total cost of the DDoS attack at between $9 and $12 million.

Click here to access the Netscout Threat Intelligence Report.

Related Videos

Cybercrime Mitigation: Is Your Critical Infrastructure Secure?

Report: DDoS Cyberattacks Pile Pressure on Critical Manufacturing Sector

Digital Supply Chain: Cybersecurity Report Flags Clear and Present Danger

Related Article

Sponsored Recommendations

High Pressue, High Temperature Pump

April 29, 2024
This innovative axial piston design eliminates the use of elastomers, increases resistance to contamination, and dramatically improves reliability. They can generate up to 10,...

MOVI-C Unleashed: Your One-Stop Shop for Automation Tasks

April 17, 2024
Discover the versatility of SEW-EURODRIVE's MOVI-C modular automation system, designed to streamline motion control challenges across diverse applications.

A Comprehensive Guide for Automation Success

April 17, 2024
Gain insight into the benefits that SEW-EURODRIVE's streamlined automation processes offer to industries involved in machine automation and factory operations.

Navigating the World of Gearmotors and Electronic Drives

April 17, 2024
Selecting a gearmotor doesn’t have to be a traumatic experience. The key to success lies in asking a logical sequence of thoughtful questions.

Voice your opinion!

To join the conversation, and become an exclusive member of Machine Design, create an account today!