While overall unplanned data center outages have decreased, those that were the result of targeted DDoS attacks have skyrocketed. Think housing your servers in a data center rather than squeezing them under your desk is a bulletproof solution? Well, they might be safer in a data center, but believe it or not, some of the same pitfalls that can create trouble in the office can affect those secure data centers too. Namely UPS failure, human error, and cybercrime. ‘Unplanned’ UPS system failure is still the principal cause of “unplanned data center outages,” according to a new report. A quarter of all such events were related to UPS systems and batteries, according to Emerson Network Power in association with Ponemon Institute. The two organizations have been studying the cost of unplanned data center outages. Cybercrime But cybercrime-caused outages, specifically Distributed Denial of Service (DDoS) attacks, constituted a whopping 22% of the unplanned disruptions last year. That’s up from just 2% in 2010 and 18% in 2013, the last times the two organizations performed the survey. The survey collected responses from 63 data center operations who had observed an outage in the prior about year about what exactly happened. The report was published this month. Root causes Accidental causes or human error were the third biggest cause of unplanned outages, according to the report. Those mishaps caused 22% of the failures. That’s the same percentage as in 2013, but lower than in 2010, when 24% of outages were accidental or human-caused. Interestingly, many other causes of outages are lower now than they were in 2010 and 2013. They’ve been usurped by cybercrime’s huge gain. UPS failure is down slightly on 2010, when it accounted for 29% of the outages. And the aforementioned human error is down a bit. And utility failure, such as water, heat, and Computer Room Air Conditioning, which today makes up just 11% of the outages, was at 15% in 2010. Generators Likewise, generators appear to have become more reliable. Those systems contributed to 10% of the failures in 2010, whereas today they only make up 6%. The researchers don’t provide numbers relating to changing data center design over the period. Fewer generators in use—replaced by solar and alternative energy—could conceivably have caused that statistical decline. The report doesn’t specify. Weather Overall, most unplanned outage causes—including those caused by weather, which accounted for 10% of outages this year, compared to 12% in 2010 and 2013—have declined in favor of cybercrime. Even IT failure, a measly 4% of failures today, dropped from 5% in 2010. About $9K per minute And the cost? The report was released to expound on the cost of the outages, rather than to apportion blame. Well, the “average total cost per minute of an unplanned outage increased from $5,617 in 2010 to $7,908 in 2013 to $8,851 now,” according to the report. Downtime at data centers now costs an average of $740,357. That’s a 38% increase on 2010, the study calculates. And maximum costs are even higher. “Maximum downtime costs are rising faster than average, increasing 81% since 2010 to a current high of $2,409,991,” the report says. Source: http://www.networkworld.com/article/3024773/data-center/data-center-outages-increasingly-caused-by-ddos.html
Category Archives: Security Websies
Lotto ticket machines, website working after DDoS attack
The National Lottery website and ticket machines were targeted by a cyber-attack to disrupt its operations. A DDoS (Distributed Denial of Service) attack floods the communications system with traffic affecting all communications connectivity. “Indications are that this morning’s technical issues were as a result of a DDoS attack affecting our communications networks,” a statement from the Lottery said. “The issues were resolved by the National Lottery’s DDoS protection systems, limiting disruption and restoring all operations within two hours. “This incident is still under investigation. However, we can confirm that at no point was the National Lottery gaming system or player data affected,” the statement added. Tonight’s jackpot is heading for €12 million. RGDATA, the representative association for the independent retail grocery sector, said the National Lottery made it aware of the problem this morning. Last February, the National Lottery was forced to postpone its draw for 24 hours after a technical problem stopped ticket machines working. Source: http://www.rte.ie/news/2016/0120/761563-national-lottery/
Read More:
Lotto ticket machines, website working after DDoS attack
Ad-clicking bots predicted to rip US$7.2 billion from Mad Men
Could it be bots that fall for for those ‘One Weird Trick’ ads? Here’s hoping! Botnets will inflict a massive US$7.2 billion in damages against online advertisers this year according to research by ad security company White Ops.…
Read More:
Ad-clicking bots predicted to rip US$7.2 billion from Mad Men
Boards.ie floored by DDoS assault
Irish forum goes away with the fairies for a while Productivity in the Emerald Isle may have peaked on Tuesday with an outage of popular forum boards.ie coming on top of Twitter’s TITSUP moment.…
Continue reading here:
Boards.ie floored by DDoS assault
Microsoft asks: We’ve taken down botnets for you. How about a kill switch?
It’s like pulling a smoking car off the road… Oh, hang on Last December, Microsoft intercepted traffic on users’ PCs and helped break up a botnet. And nobody complained. So the company very tentatively asked at a session on ethics and policy in Brussels this week whether it should do more.…
View post:
Microsoft asks: We’ve taken down botnets for you. How about a kill switch?
A DDoS Learning Curve for Universities, Government & Enterprises
Distributed Denial of Service attacks are easy, cheap and too often, effective. But they’re not unstoppable. There’s no getting around it — DDoS attacks are growing in frequency, size, severity, sophistication, and even persistence each year. These tenacious, effective attacks can last anywhere from hours to months. They can be launched from botnets, use multiple protocols, and even disguise themselves with SSL encryption. Protecting yourself against DDoS isn’t a matter of stopping one attack but a multitude, sometimes all at once. Even worse, IT departments may not realize an attack is underway, thinking a failing server or application is responsible. Rutgers University, for example, recently fell prey to its sixth known DDoS attack in a single year — and Rutgers is not an outlier. Thousands of DDoS attacks hit universities, enterprises, government organizations, and banks every day—some successful, some not. One thing is for sure: no one is safe, and attacks will continue because DDoS attacks are easy, cheap and, too often, effective. But they’re not unstoppable. Universities and other organizations can take steps to prepare for and minimize the effect of even the most sophisticated assaults: Step 1. Have a good monitoring system in place Security teams have many ways to get insight into their network, including flow sampling, in-path detection and mirrored data packets. Here’s a brief breakdown of the pluses and minuses: Flow sampling: The router samples packets and exports datagrams on them. While scalable, this method leaves out large quantities of information because it only samples one packet out of thousands. This allows some “slow and low” attacks to fly under the detection radar, or take a long time to trigger an alert. In-path detection: A high-performance DDoS mitigation device continuously processes all incoming traffic and possibly outgoing traffic. The device can take immediate action with sub-second mitigation times. One concern is ensuring the mitigation solution can scale with the uplink capacity during multi-vector attacks. Mirrored data packets: Full detail for analysis is provided, while not necessarily in the path of traffic. This method can be a challenge to set up, but allows for fast detection of anomalies in traffic and is a centralized place for analysis and mitigation. Step 2. Keep an eye on performance metrics and scalability When it comes to DDoS, everything happens on a large scale: the number of attacking computers, the bandwidth they consume and the connections they generate. To fight back, organizations need a combination of high-performance, purpose-built hardware that can mitigate common, yet large-scale attacks effectively, and intelligent software that can inspect traffic at the highest packet rates. For instance, an effective combination might include leveraging dedicated network traffic processors (e.g. FPGAs) to handle the common network-layer attack in combination with powerful, multi-core CPUs to mitigate more complex application-layer attacks. What’s key here is to ensure there is enough processing headroom to prepare networks for future generations of DDoS attacks. Step 3. Invest in a security awareness program Mitigation of next-generation DDoS attacks starts with training — especially to recognize normal network behavior and spot anomalies. For instance, companies that have started their migration to IPv6 must have security specialists in place that know IPv6 well enough to recognize attacks when they happen, and then to know how to use available tools to properly fight them off. Proper training allows organizations to be proactive versus reactive. Security policies take time to devise, so universities and other organizations shouldn’t wait for the IT support staff to raise a red flag before they decide to take action. Source: http://www.darkreading.com/attacks-breaches/a-ddos-learning-curve-for-universities-government-and-enterprises-/a/d-id/1323879
Continue Reading:
A DDoS Learning Curve for Universities, Government & Enterprises
DDoS extortion gang suspect arrested
One suspect has been arrested and a second detained after a Europol-led raid on a gang suspected of carrying out cyber-attacks and demanding ransoms.
Continue reading here:
DDoS extortion gang suspect arrested
Group using DDoS attacks to extort business gets hit by European law enforcement
On 15 and 16 December, law enforcement agencies from Austria, Bosnia and Herzegovina, Germany and the United Kingdom joined forces with Europol in the framework of an operation against the cybercrimin…
More here:
Group using DDoS attacks to extort business gets hit by European law enforcement
DDoS attack on Pakistan Government Websites on Live Radio
Dozens of government websites in Pakistan have been targeted by hackers, including one military site that was taken down during a live radio interview with one of the group’s members. The organization responsible, known as New World Hackers, performed a distributed denial of service (DDoS) attack on Pakistan’s Frontier Constabulary website during an appearance on the AnonUK Radio Show on Sunday, following a weekend of sustained attacks on government sites. Dozens of government websites in Pakistan have been targeted by hackers, including one military site that was taken down during a live radio interview with one of the group’s members. The organization responsible, known as New World Hackers, performed a distributed denial of service (DDoS) attack on Pakistan’s Frontier Constabulary website during an appearance on the AnonUK Radio Show on Sunday, following a weekend of sustained attacks on government sites. “It’s not that the Indian hackers want to attack Pakistani sites, there is a war between them and the Pakistani hackers,” the New World Hackers member says. “We upgraded the capabilities of the Indian hackers. “The Pakistani hackers always wish to fuck with India. The Indian hackers are actually the good guys.” Pakistan’s Frontier Constabulary did not respond to a request for comment. Source: http://www.newsweek.com/hackers-take-down-pakistan-government-websites-live-radio-413888
Taken from:
DDoS attack on Pakistan Government Websites on Live Radio
Minnesota Courts Website Target Of DDoS Attacks
A week after the Minnesota courts website was completely shut down for 10 days in December, we’re finally finding out why. The Minnesota Judicial Branch says its website was the target of two distributed-denial-of-service (DDoS) attacks. In a DDoS attack, a website or server is overwhelmed with network traffic until it can no longer function for legitimate users. The MJB says the attacks in December left their site unusable to members of the public for several hours, and was eventually completely shut down from Dec. 21 to 31 in order to install additional safeguards. Officials say no personal data was breached as a result of the attack — DDoS attacks are typically used to sabotage a website or server , rather than steal information. Authorities say initial forensics show the attacks were primarily launched from servers in Asia and Canada, and international authorities are investigating. Source: http://minnesota.cbslocal.com/2016/01/08/minnesota-courts-website-target-of-ddos-attacks/
Visit link:
Minnesota Courts Website Target Of DDoS Attacks
