<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

DDoS Threat Report 2018 Q1

Looking at the historical landscape clearly shows cyber perpetrators dogged pursuit of stronger firepower. Two waves of amplification attacks have come to the forefront recently: The first wave consisted of DNSSEC Amplification attacks observed in our Q4 2017 Threat Report, while the second one appeared this quarter in the form of Memcached attacks.

  • DNS Amplification attacks surged 201.42% quarter-on-quarter (QoQ) and 660.92% year-on-year (YoY).
  • 55 of the attacks were due to exploited Memcached servers.
  • The amplification factor of attacks leveraging Memcached servers can go as high as 51,000X.
  • Two-vector attacks were primarily NTP and DNS Amplification attacks using UDP in a volumetric role.
2018Q1

Nexusguard’s honeypot collected lots of information about Memcached attacks. Source IPs gathered from the scanning logs are believed to be bot/attacker IPs since valid addresses had to be used to check the Memcached server and accept return traffic. The attack log shows that perpetrators spoofed the source IP to the victim IP so the Memcached server would forward attack traffic directly to victims.

You may be interested in

DDoS Threat Report 2020 Q1

In the first quarter of the year, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter. Researchers attribute the sharp rise in incidents to malicious efforts during the COVID-19 pandemic, causing DDoS attacks to inte...

DDoS Threat Report 2019 Q4

An unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful. What’s more, ...

DDoS Threat Report 2019 Q3

DNSSEC (Domain Name System Security Extensions) remain the main driver of growth of DNS amplification attacks in the quarter, yet our analysts have detected a sharp and concerning rise in TCP SYN Flood attacks. TCP SYN Flood is not a new method, but findings indicate that techniques have grown in...

DDoS Threat Report 2019 Q2

DNS amplification attacks swelled in Q2 2019, with the amplified attacks spiking more than 1,000% compared with Q2 2018. Nexusguard researchers attributed Domain Name System Security Extensions (DNSSEC) with fueling the new wave of DNS amplification attacks, which accounted for more than 65% of t...

DDoS Threat Report 2019 Q1

Despite the earlier FBI crackdown, the DNS amplification types of DDoS attacks continued to be a favorite of DDoS-for-hire websites, soaring more than 40 times their volume compared to last quarter. The resurgence of DDoS-as-a-service and the growing botnets reinforce the evolving cyber threat of...