Mobile applications being used for DDoS attacks to increase
"The prevalence of mobile devices and the widespread availability of downloadable apps that can be used for DDoS is a game changer," said Stuart Scholly, president of Prolexic. "Malicious actors now carry a powerful attack tool in the palm of their hands, which requires minimal skill to use. Because it is so easy for mobile device users to opt-in to DDoS attack campaigns, we expect to see a considerable increase in the use of these attack tools in 2014."
Data gathered in Q4 from attacks against Prolexic's global client base shows that mobile devices participated in a DDoS attack campaign against a global financial services firm. Digital forensics and attack signature analysis conducted by the Prolexic Security Engineering and Response Team (PLXsert) detected the use of AnDOSid, an Android operating system tool that performs an HTTP POST flood attack.
"Mobile devices add another layer of complexity," explained Scholly. "Because mobile networks use super proxies, you cannot simply use a hardware appliance to block source IP addresses as it will also block legitimate traffic. Effective DDoS mitigation requires an additional level of fingerprinting and human expertise so specific blocking signatures can be developed on-the-fly and applied in real-time."
Prolexic believes that developers of applications commonly used in DDoS attacks like Low Orbit Ion Canon (LOIC) will increasingly port them to mobile platforms in 2014. "Traditionally, some type of infection or malware was required," said Scholly. "With mobile apps, malicious actors can choose to proactively participate in orchestrated DDoS attack campaigns. When you consider how many mobiles device users there are in the world, this presents a significant DDoS threat."
Prolexic's latest DDoS attack report shows the total number of attacks against its clients in Q4 2013 once again set a new record for one quarter, illustrating the heightened level of DDoS activity throughout 2013. Compared to the same quarter one year ago, total attack volume increased 26 percent. A week-by-week comparison to Q4 2012 shows increases in attack volume across eight of the 12 weeks of the quarter.
A complimentary copy of the report is available as a free PDF download from www.prolexic.com/attackreports (http://bit.ly/1m3CASu). Prolexic's Q1 2014 report will be released early in the second quarter of 2014.
- Improving drive test reliability and accuracy remotely
- Development kit targets consumer-ready wearable and IoT devices
- High power low-pass filters handle up to 2500 W
- Ultra-low-jitter LVCMOS clock buffers
- Latest Low Voltage Directive includes risk assessment
- Integrated home gateway network processor delivers carrier class connectivity
- Modern car IT architecture — software defined and open source
- Virtualized multi-service broadband network standards address SDN and NFV
- Laird partners with LoRa Alliance to advance enterprise IoT
- Axell Wireless joins Aeroflex to form Cobham Wireless
- High linearity, active bias ultra low noise amplifier
- Cloud security software to see rapid growth
- DAS platform supports five frequency bands for European market
- Broadband low noise amplifiers cover 30 MHz to 40 GHz
- SIGFOX secures a record $115 million funding for global IoT
- Tiny mobile brain-computer interface for smartphones
- Understanding electromagnetism in a dielectric solid to lead to antennas on a chip
- Harvesting energy from electromagnetic waves
- Graphene converts light-to-electricity in under 50 femtoseconds
- 50 GHz Germanium waveguide electro-absorption modulator demonstrated
- New class of magnetic materials could boost wireless data transmission
- IBM invests 3 billion USD to bring IoT to the enterprise
- Will a silicon sphere become the new kilogram standard?
- Making drones safer and smarter
- Future smartphones could offer 3D cameras
- Patent boosts mobile upload speeds by tenfold
- ZigBee STB market looks to rapid growth
- Liquid metal printer for wearable technology and soft robotics
- Thin light-powered Bluetooth LE beacons wrap around objects
- End-to-end encryption app for the masses
- Doherty Power Amplifier using 2-stage asymmetrical IC designed for 1.8-2.2 GHz applications
- Software-Defined Radio Handbook
- Upgrading Analogue Radios with Digital Voice Encryption Easily and Cost Effectively
- Top 5 Trends in Product Development and Test Engineering
- RF/Microwave Instrumentation Â“SÂ” Series Amplifiers
- Application Guide to RF Coaxial Connectors and Cables