Asia Pacific The Top Region for Network DDoS Attacks In 2021

0

Imperva’s 2021 DDoS Threat Landscape Report has found the Asia Pacific region was the top target for network DDoS attacks in H1 2021, making up 46% of all attacks.

A third (33%) of all network DDoS attacks targeted Taiwan. The Philippines, the number one target in H1 2020, still featured in the top five but decreased significantly from 35% to 12%.

Top 5 Target Countries for Network DDoS Attacks

H1 2020 H1 2021
Rank Country % Rank Country %
1 Philippines 35.08% 1 Taiwan 33.69%
2 Taiwan 31.92% 2 United States 28.15%
3 United States 18.17% 3 United Kingdom 12.30%
4 Gibraltar 7.84% 4 Germany 12.17%
5 Hong Kong 4.75% 5 Philippines 11.99%

 

When looking at application DDoS attacks, the ANZ region featured prominently with Australia in third and New Zealand in sixth.

Collectively the region accounted for 7% of application DDoS attacks globally which is quite high considering its relatively small population. However, attacks on Australia have halved since H1 2020.

Top 6 Target Countries for Application DDoS Attacks

H1 2020 H1 2021
Rank Country % Rank Country %
1 United States 35.77% 1 United States 60.63%
2 Australia 11.32% 2 Brazil 6.24%
3 Philippines 6.13% 3 Australia 4.90%
4 Germany 5.75% 4 United Kingdom 4.46%
5 United Kingdom 5.09% 5 Indonesia 2.45%
6 Spain 4.8% 6 New Zealand 2.23%

 

Reinhart Hansen, CTO for Imperva Asia Pacific and Japan said this is likely due to the region’s acceleration of DevOps programs and practices during COVID.  This has led to a major increase in the number of Internet facing applications that organisations are releasing and hence a much larger attack surface for cyber criminals to target.

“The cyber criminal groups that use more advanced application layer DDoS attacks usually have a more sophisticated mindset and skill set.  Their members typically have strong software development skills and the know-how to build highly targeted attack tooling.  ANZ organisations are adopting DevOps tools and practices for building and deploying more applications at a faster rate than ever before.  This has become more evident during the COVID-19 pandemic.  This brings with it a vast increase in application attack surface that cyber criminals are constantly targeting.  This fast, increasing rise in application attack surface could explain why ANZ features so prominently as a target.”

In terms of industries, computing and IT organisations accounted for almost 30% of all application layer attacks mitigated by Imperva in H1 2021, followed closely by business services (25%) and financial services (22%).

SHORTER ATTACKS CONFOUND LEGACY DEFENCES

Imperva Research Labs found a clear trend towards shorter, higher volume attacks. Since 2020, DDoS attacks have increased four-fold, volume has doubled and the average attack duration is just six minutes.

“This type of attack is designed to take out organisations with low or legacy defenses, including those that mistakenly assume their telecommunications or internet service provider (ISP) will automatically provide a level of DDoS protection,” Hansen said.

“Not all ISPs and telcos provide their customers with DDoS protection. Of those that do, most don’t typically protect against all the different types of DDoS attacks. They also tend to use in-house technology and solutions that are not ‘always-on’ and don’t leverage a global mitigation approach. Instead they offer a manual or semi-automated response that uses localised mitigation. This is simply not effective in protecting against these global, highly distributed, short, sharp, persistence attacks. In fact, the network routing changes that are enacted by ISPs and telcos to mitigate these attacks usually compound the duration and disruption of the attack itself.  The worst case is that they null route your organisation’s ingress internet traffic until the attack is over.  This effectively protects their own shared customer infrastructure from the effects of an attack but it takes the targeted organisation totally offline.”

DDoS USED AS A DISTRACTION

Shorter attacks can signal another danger. That is, they may be a distraction tactic as part of a wider multi-vector attack.

“DDoS causes all this noise in an organisation’s network and infrastructure, making it hard to detect other incidents that might be taking place,” Hansen explains. “Cyber criminals can use that as cover to conduct some kind of lateral movement or data exfiltration exercise with less chance of being detected.”

LOW BARRIER TO ENTRY AND HIGH RETURNS

The barriers to launch a DDoS attack are extremely low, Hansen said.

“The tools for launching a DDoS attack are readily available via DDoS-for-hire sites on the dark web, and even the normal internet. This means anyone has the ability to launch a DDoS attack without much effort or knowledge on how to do it. And it is cheap – costing as little as $5 an hour,” he said.

Imperva’s research indicates that such services are increasing in popularity as they generally use less sophisticated attack vectors such as Transmission Control Protocol (TCP). In the last 12 months, packet-based TCP attacks increased from just over 10% to almost 32%, and bandwidth-based TCP attacks grew from 4% to 18%.

However, while DDoS attacks are cheap and easy to use, they can have a devastating impact on a business. One hour of downtime costs a business $100k on average, and a quarter of DDoS targets are hit ten times or more.

Downtime and major disruption to revenue producing activities isn’t the only way DDoS threat actors can make you pay. Ransom threats are on the rise. Imperva researchers have monitored threats against several of our customers where extortionists have demanded payment in BitCoin to prevent launching a DDoS attack.  Demands in excess of US$1m are not unusual. Imperva has helped numerous customers globally implement swift response plans and mitigation for such incidents.

You can read the full report here.

Share.

Leave A Reply