DDoS Attacks Double In A Year As Akamai Warns Of Future IPv6 Threat

A record number of distributed denial of service (DDoS) attacks were carried out during the first quarter of 2015, research has found.

A new report from Akamai found that the number of DDoS attacks doubled in the past year, increasing by more than a third from the last quarter alone. The typical attack now uses less bandwidth but lasts longer with the average attack duration increasing by 42.8 percent to 24.82 hours, typically using 10Gbps.

Despite this, there were eight “mega attacks” exceeding 100Gbps, with the largest recorded at 170Gbps.

Rise of SSDP

The company also highlighted the increasing use of the Simple Service Discovery Protocol (SSDP)  to stage such attacks and the growing threat of IPv6 methods.

A fifth made use of SSDP, a common protocol enabled by default on millions of home and office devices, such as routers, smart TVs, printers and webcams, to allow them to discover each other.

However if SSDP is left unsecured or misconfigured, such devices can act as “reflectors” to enhance the ferocity of DDoS attacks. SSDP exploitation is also having a knock-on effect on the power of ‘DDoS for hire’ vectors, which had peaked at 10-20Gbps, but are now capable of delivering 100Gbps and above.

The gaming industry was the most targeted, accounting for 35 percent of all DDoS, ahead of the tech sector which was targeted by a quarter. In terms of web application attacks, the retail sector was hit hardest, followed by media and entertainment.

Two thirds of web application attacks used the local file inclusion (LFI) vector, mainly due a massive campaign against two large retailers in March which exploited the WordPress RevSlider plugin, while 29 percent used a SQL injection (SQLi) attack. Researchers are concerned that SQLi attacks have the ability to move beyond more data theft, warning they have the potential to elevate privileges, execute commands and corrupt data.

Akamai has also warned more needs to be done to protect businsses against IPv6 attacks as the transition from IPv4 continues. It says that IPv6 DDoS are not yet common, but such methods are being tested, putting cloud providers and corporate networks at risks.

Many IPv4 DDoS methods can be used to stage IPv6 campaigns, while some IPv6-specific methods can even bypass IPv4 protections, potentially creating more powerful attacks.

How much do you know about hacking? Take our quiz to find out!

Steve McCaskill

Steve McCaskill is editor of TechWeekEurope and ChannelBiz. He joined as a reporter in 2011 and covers all areas of IT, with a particular interest in telecommunications, mobile and networking, along with sports technology.

Recent Posts

Amazon To Shutter Sites In Unionised Province In Canada

1,700 jobs to be lost in Quebec, as Amazon says it will close seven sites…

12 hours ago

Google Wins UK Injunction To Halt Russian Enforcement Of Judgements

Google wins permanent injunction from London's High Court to prevent enforcement of Russian YouTube judgements

14 hours ago

Tech Giants Announce $500 Billion AI Plan In US

OpenAI, SoftBank, Oracle and others form joint venture called 'The Stargate Project' – to build…

15 hours ago

CMA Chair Replaced By Government Amid Growth Drive

Government replaces chairman of the competition watchdog with former Amazon boss, amid Labour's “growth” drive…

17 hours ago

Google Invests $1 Billion in AI Startup Anthropic

More investment into OpenAI rival Anthropic, after Google reportedly makes fresh investment of more than…

20 hours ago

The State of Additive Manufacturing: Head-to-Head

Explore insights from Mathieu Pérennou, Additive Manufacturing Solutions Director at Hexagon, on how 3D printing…

20 hours ago