New Protocols That Stymie Defenses
Adversaries have taken advantage of the asymmetry inherent to DDoS campaigns where it’s relatively inexpensive to launch an attack once a device vulnerability has been found but expensive to defend against, especially for companies with lots of on-premises equipment, said Patrick Donahue, Cloudflare’s director of product management. Payments are frequently made with cryptocurrency to reduce traceability.
Threat actors have embraced novel types of DDoS attacks such as using new protocols that are more difficult to defend against and having the browser speak to the web server to receive the latest content from webpages, Donahue said. DDoS attacks are also accessible to a broader base of threat actors since it’s easier to launch a DDoS operation than it is to infiltrate a company’s network and launch malware.
Ninety-seven percent of DDoS attacks last for under an hour, meaning that businesses need to have defenses that can kick into high gear very quickly, according to Donahue. Organizations can save substantial amounts of money by defending DDoS attacks as close to the source as possible, Donahue said.