half year 2018 ddos trends...

14
Half Year 2018 DDoS Trends Report

Upload: others

Post on 10-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

Half Year 2018 DDoSTrends Report

Page 2: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

Organizations have become dependent on the Internet as a means to conduct business and deliver consumer/citizen services.

The Internet-connected world has grown more complex due to faster connections, the widespread adoption of Internet of Things (IoT) devices, and cloud services. Simultaneously, Distributed Denial of Service (DDoS) threats have become more sophisticated and frequent. Whilst unlawful in many countries, DDoS-for-hire services are commonplace and inexpensive.

Internet resilience can come down to a fraction of a second. When the Internet goes down, businesses that rely on that service go down with it, and DDoS attacks are considered one of the most serious threats to Internet availability today. Downtime or latency can significantly impact brand reputation, customer trust and revenue. Within Europe, the introduction of the GDPR and NIS legislation has significantly increased the risk of punitive fines for cyber-resilience failures.

This report contains observations from DDoS attack attempts against Corero customers in Q1 2018 and Q2 2018, as well as comparisons against previous quarters.

The key highlights are:l Low volume, sub-saturating attacks continue to dominate (95% less than 5Gbps)l The number of attacks is up 40% year-over-yearl Whilst still infrequent, attacks over 10Gbps have doubledl Attacks are becoming even shorter in duration (82% under 10 minutes)l 1 in 5 of victims are attacked again within 24 hours of an initial attack

Other notable events within the reporting period included:l The Memcached exploit gained notoriety by smashing the record for the largest DDoS attacks ever reportedl National intelligence and law enforcement agencies took proactive, well publicized measures to take-down DDoS-for-hire servicesl Governments became increasingly vocal about Nation State sponsored cyber-attacks and the threat these pose to critical national infrastructure.

© Corero 2018 | corero.com | Page 2

EXECUTIVE SUMMARY

Key Trends

Key Insights

Recommendations

Summary

371214

Page 3: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

3Corero DDoS Trends Report | Q2–Q3 2017

KEY TRENDIncrease in frequencyWe have just passed the one-year anniversary of what many believe to be one of the largest DDoS attacks recorded. Domain Name Service Provider Dyn came under attack by two large and complex DDoS attacks against its managed DNS infrastructure. Because of the attacks, dozens of Internet platforms and services — including major brands such

Since that incident, other various large-scale DDoS attacks have made national or even global headline news. However, those large-scale attacks are atypical of the types of disruptions that

Frequent, modest-sized, short duration DDoS attacks are the modern-day problem, as they regularly cause the most damage. It’s these types of attacks on which businesses should focus.

Corero has observed a jump in the frequency of attack attempts against customers. In the last quarter (Q3 2017), Corero customers experienced an average of 237 attacks per month, an increase of 35% compared to Q2 2017 (175 attacks).

Worryingly, we saw an average of 8 attack attempts per customer, per day in Q3 2017 — double what was observed in Q1 2017.

Daily

Q2 2016Q4 2016 Q3 2017Q1 2017

Weekly

237

710

598

526

175

446

372

124

28.64.1

328

109

25.23.6

Monthly Quarter

40%Increase in Attacks

per Quarter

Average Attack per Customer

7

Attacks per Day

Attacks per Customer up 40% in last 12 months

KEY TREND

l In February and March 2018, the record for the largest DDoS attacks ever reported was smashed by the 1.3Tbps attack on Github and a subsequent 1.7Tbps attack on an unnamed US-based Service Provider. Both of these attacks and others that followed exploited vulnerable Memcached servers to amplify the attacks to these unprecedented levels. However, those large- scale attacks are atypical of the types of disruptions that companies suffer from day-to-day. And, in this case, much of that vulnerable Memcached infrastructure has now been closed down by its owners, removing the possibility of a repeat of such attacks using this particular technique.

l Frequent, modest-sized, short duration DDoS attacks are the modern-day problem, as they regularly cause the most damage. It’s these types of attacks on which businesses should focus.

l Worryingly, Corero has observed a year-over-year increase in the frequency of attack attempts against customers. In the last quarter (Q2 2018), Corero customers experienced an average of 8 attacks per day, an increase of 40% compared to Q2 2017 (6 attacks per day).

Q4 2016 Q1 2017 Q2 2017 Q3 2017 Q4 2017 Q1 2018 Q2 2018

DAILY 4 4 6 8 7 6 8

2015 2016 2017 2018 Q1 & Q2

DAILY 4 4 6 7

© Corero 2018 | corero.com | Page 3

Page 4: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

Average Size of DDoS AttacksAverage Duration of DDoS Attacks

MINUTES 2015 2016 2017 2018 2018 Q1 Q2

0-5 63% 54% 58% 57% 69% 6-10 17% 18% 13% 15% 13% 11-20 7% 8% 10% 12% 7% 21-30 8% 11% 7% 5% 3% 31-60 3% 4% 6% 6% 4% >60 2% 5% 6% 5% 4%

MINUTES 2015 2016 2017 2018 Q1 & Q2

0-5 63% 54% 58% 63% 6-10 17% 18% 13% 14% 11-20 7% 8% 10% 10% 21-30 8% 11% 7% 4% 31-60 3% 4% 6% 5% >60 2% 5% 6% 4%

94%Attacks 5Gbps

or less

77%Attacks 10 Minutes

or less

Low volume, short duration attacks dominate

KEY TREND

© Corero 2018 | corero.com | Page 4

SIZE 2015 2016 2017 2018 2018 Q1 Q2

<1G 87% 77% 82% 77% 85% 1G-5G 9% 18% 14% 16% 10%

5G-10G 3% 4% 3% 5% 3% >10G 1% 1% 1% 2% 2%

SIZE 2015 2016 2017 2018 Q1 & Q2 Q1 Q2

<1G 87% 77% 82% 81% 1G-5G 9% 18% 14% 13%

5G-10G 3% 4% 3% 4% >10G 1% 1% 1% 2%

Page 5: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

While the frequency of attacks is concerning, the size and duration of attacks remains the primary concern. Just as we saw in the second half of 2017, in both Q1 and Q2 2018 roughly 95% of mitigated DDoS attacks were less than 5 Gbps in volume.

The principal change is that short duration attacks are getting shorter. In Q2 2018, 82% of attacks lasted less than 10 minutes; up from 71% in 2017. In Q2, we saw a significant change with 69% of attacks lasting less than 5 minutes; markedly up from 58% in 2017 and 57% in Q1.

The long term trend of attacks over 20 minutes being in decline also continued. In Q2, only 11% of attacks lasted longer than 20 minutes; down from 19% in 2017.

Whilst still in the extreme minority, attacks over 10Gbps have “doubled” in the last year from 1% to 2%.

In summary, low volume, short duration attacks continue to dominate with these attacks becoming even shorter.

Low volume, short duration attacks dominate

KEY TREND

© Corero 2018 | corero.com | Page 5

Page 6: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

A new key trend for this version of the report is the probability that victims will suffer from a repeat attack.

While 60% of victims do not experience repeat attacks within 90 days, the long term trend is that victims have a 1 in 5 chance of being attacked again with 24 hours.

We have excluded from this data so-called “saw tooth” or “pulse” attacks which are characterized by attacks which switch-on for, say, 5 minutes and then reappear several minutes later in a similar or mutated form. Corero counts these as a single attack which has presumably been designed to evade traditional redirection to scrubbing center defenses and/or to allow DDoS-for-Hire services to multiplex between different attack victims.

DAY 2017 2017 2017 2017 2018 2018 Q1 Q2 Q3 Q4 Q1 Q2

<1 25% 23% 23% 22% 20% 21% 2-7 9% 8% 9% 8% 7% 7% 8-30 4% 8% 7% 7% 6% 6% 31-90 2% 4% 3% 3% 3% 3%

28%Probability of repeat

attack within 7 days

the long term trend is that victimshave a 1 in 5 chance of being attacked

again with 24 hours.

DAY 2017 2017 2017 2017 2018 Q1 & Q2 Q1 Q2 Q3 Q4

<1 25% 23% 23% 22% 21% 2-7 9% 8% 9% 8% 7% 8-30 4% 8% 7% 7% 6% 31-90 2% 4% 3% 3% 3%‘‘ ‘‘

Probability of repeat attacks

KEY TREND

© Corero 2018 | corero.com | Page 6

Page 7: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

The Memcached reflection vulnerability has been around for longer than 10 years, but the exploit was demonstrated and explained last year at a conference and its usage in the wild ramped up shortly afterwards. Memcached made mainstream news in February and March 2018 as the vector of the largest DDoS attacks ever reported.

The attacks were reported as being greater than 1.3 and 1.7 terabits in size, originating from worldwide vulnerable Memcached servers being leveraged as UDP reflection/amplification sources.  

Throughout February and March responsible companies scrambled to patch or reconfigure their vulnerable Memcached servers, removing them from the pool being leveraged by the attackers.  However, Memcached attacks have continued even after a large percentage of Memcached servers have been secured.

Standalone Memcached attacks still occur as a potent standalone vector while also appearing as part of multi-vector attacks accompanying NTP, DNS and other reflective attacks.

Memcached attacks have continued even

after a large percentage of Memcached servers

have been secured

‘‘ ‘‘

Evolution of the Memcached attacks havenow reached mainstream

KEY INSIGHT 1

© Corero 2018 | corero.com | Page 7

Page 8: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

Repeat attacks against the same victim (by IP address) continue in 2018 at the approximately same probability reported during the past year, 2017, when measured over time spans of one day, one week, one month and one quarter.

DDoS attacks target victims for various reasons. Whatever the motivation, current data suggests that there is currently a 21% chance of a repeat attack in 24 hours and a 37% chance of a repeat attack within 90 days.

When combined with the data indicating that the majority of attacks are also less than 10 minutes, these findings call into question the efficacy of detect, redirect and mitigate solutions that may need ten minutes or more to initiate mitigation. The only way to avoid repeat outages from these repeat attacks is to deploy active real-time protection against DDoS that can mitigate in seconds or less.

The only way toavoid repeat outages from these repeat attacks is to

deploy active real-time protection against

DDoS

‘‘ ‘‘

Repeat DDoS Victim continues

KEY INSIGHT 2

© Corero 2018 | corero.com | Page 8

Page 9: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

While governments around the world are cracking down on “darkweb” online DDoS attack websites (known as booter or stresser sites), launching DDoS attacks via third parties continues to be easy and inexpensive. 

To counteract the ongoing DDoS threat, Digital Enterprises are increasingly considering DDoS protection a requirement for business continuity.

To maximize the value to their DDoS investment and mitigation effectiveness, the requirement for automated DDoS mitigation is also increasing in importance and manual or human directed mitigation is becoming a last resort effort.  This also applies to decisions related to traffic redirection to mitigate attacks.  

The time it takes to detect an attack, redirect to a scrubbing center and then manually approve attack vector countermeasures is often longer than most attacks and certainly longer than most servers are able to absorb without a DDoS outage. 

launching DDoS attacks via third parties continuesto be easy and inexpensive.  ‘‘ ‘‘

Automatic versus Manual DDoS Mitigation Trend

KEY INSIGHT 3

© Corero 2018 | corero.com | Page 9

Page 10: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

Law enforcement agencies around the world are cracking down on the criminals behind DDoS attack services.

In April, Europol supported by the UK National Crime Agency and their Dutch counterparts combined to take-down Webstresser.org. So-called web-stressers have long been suspected as DDoS-for-hire attack services masquerading as a legitimate business.

In May, the US FBI seized an Internet domain allegedly being used by Russian criminals and a botnet of 500,000 hijacked routers. The proactive seizure is believed to have neutralized the threat from this botnet.

Despite these actions, launching DDoS attacks continues to be straightforward and inexpensive. In many jurisdictions, launching a DDoS attack remains a criminal act.

The issue for law enforcement agencies and businesses is that cost of defending against the threat is orders of magnitude more expensive than the cost to launch an attack.

So-called web-stressers have long been suspected as DDoS-for-hire attack services masquerading as a legitimate business  ‘‘ ‘‘

Law Enforcement gets on the front foot

KEY INSIGHT 4

© Corero 2018 | corero.com | Page 10

Page 11: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

There has been a notable change in tone and rhetoric from governments and government agencies blaming foreign governments and their associates as being the source of cyber-attacks.

In the west, the most frequently cited sources of attacks have been Russia, China, Iran and North Korea.

Whilst these accusations align with the western political narrative, there is plenty of hard evidence to support these assertions including well-publicized DDoS attacks on the Winter Olympics, major banks, energy firms and election infrastructure.

Agencies are also proactively warning of devastating attacks on critical national infrastructure. For example, in January the head of the UK’s National Cyber Security Centre warned that a major cyber-attack on national infrastructure is a matter of “when, not if”.

In May, the FBI somewhat bizarrely warned owners of small office and home routers to power cycle (reboot) the devices citing foreign cyber-actors as having compromised hundreds of thousands of routers worldwide.

the head of the UK’s National Cyber Security Centre warned that a majorcyber-attack on national infrastructure is a matter of “when, not if”  ‘‘ ‘‘

Nation State sponsored attacks

KEY INSIGHT 5

© Corero 2018 | corero.com | Page 11

Page 12: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

The DDoS threat landscape will continue to evolve just as it has for the last couple of decades. We continue to see an increase in attack attempts against our customers quarter over quarter, with some of our customers experiencing thousands of attack attempts per month.

The sophistication of DDoS attacks continues to evolve, with multi-vector attacks being used more often than not. These attacks are used to profile existing security solutions and infrastructure, to probe and determine which vectors and techniques will prove successful.

These attacks are used to profile existing security solutions and infrastructure, to probe and determine which vectors and techniques will prove successful. These attacks are also sophisticated enough to leave just enough bandwidth available for other cyber attacks to make their way undetected into the network, past weakened network security layers.

There would be little to no trace of these additional attack vectors infiltrating the compromised network, as the initial DDoS had accomplished its purpose of distracting all security resources from performing their intended functions.

Understand the evolving threat landscape

RECOMMENDATION 1

© Corero 2018 | corero.com | Page 12

Organizations that once had DDoS protection projects on the back burner are now re-prioritizing their security strategies to place DDoS mitigation at the forefront.

This shift in precedence puts increased pressure on Internet and cloud providers to enable this protection for their customers, and eliminate DDoS threats closer to the source.

Providers are now accepting a greater responsibility for defending their customers and networks against DDoS attacks. This approach allows for new security service offerings that protect and increase customer satisfaction. 

Talk DDoS with your ISP

RECOMMENDATION 2

Page 13: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

© Corero 2018 | corero.com | Page 13

To keep up with the growing sophistication and organization of well-equipped and well-funded threat actors, it’s essential that organizations maintain comprehensive visibility and automated mitigation capabilities across their networks to instantly detect and block any potential DDoS attacks as they arise.

Proactive DDoS protection is a critical element in proper cyber security against loss of service availability and data breach activity. The everyday DDoS attack that Corero has highlighted in this report cannot be properly defeated with traditional Internet gateway security solutions such as firewalls, Intrusion Prevention Systems and the like. Similarly, on-demand cloud based DDoS scrubbing alternatives cannot achieve successful mitigation with the low volume, short duration attacks that are impacting organizations every day.

As organizations develop their DDoS resiliency plans, and choose their methods of DDoS protection, time-to-mitigation must be a critical factor. 

Enable real-time threat detection and mitigation mechanisms

RECOMMENDATION 3

Page 14: Half Year 2018 DDoS Trends Reportinfo.corero.com/rs/258-JCF-941/images/H1-2018-Corero-Trends-Report-Final.pdfDDoS mitigation is also increasing in importance and manual or human directed

21%Chance of repeatattack in 24 hours

7Attacks

per Customerper Day

77%Attacks 10 Minutes

or lessAttacks over 10Gbps

has doubled

+++

H1 2018

x2

SUMMARY

© Corero 2018 | corero.com | Page 14

About Corero Network Security

Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and digital enterprises rely on Corero’s award winning technology to eliminate the DDos threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This industry leading technology provides cost effective, scalable protection capabilities against DDos attacks in the most complex environments while enabling a more cost effective economic model than previously available. For more information, visit www.corero.com Copyright 2018 Corero Newwork Security, Inc. All rights reserved. 867-5309-003

US Headquarters225 Cedar Hill Street Suite 337Marlborough, MA 01752+1 [email protected] EMEA HeadquartersRegus House, Highbridge, Oxford Road, Uxbridge, England UB8 1HR, UK+44 (0) 1895-876579