![]() The special features emphasized in the adverts for DDoS services can give a particular service an advantage over its competitors and sway the customer’s choice: Information about the popularity of a DDoS service Rates for DDoS Statistics provided by one service to demonstrate the popularity of DDoS attack scenarios Statistics provided by one service to demonstrate its popularity with DDoS customers (479270 implemented attacks) However, these figures may be inflated by the owners of services to make their resources look more popular. Many of the web services offering DDoS attacks claimed to have tens of thousands of registered accounts. Some of the services we identified contained information on the number of registered users, as well as data on the number of attacks carried out per day. In other words, cybercriminals have their own loyalty and customer service programs.ĭDoS service advertised on a Russian public forum offering attacks from $50 per day Some developers even offer bonus points for each attack conducted using their service. These web services are fully functional web applications that allow registered customers to manage their balance and plan their DDoS attack budget. In fact, the functionality of these web services looks similar to that offered by legal services.Įxample of a web service for ordering DDoS attacks that looks more like the web page of an IT startup than a cybercriminal operation Customers can use them to make payments, get reports on work done or utilize additional services. The majority of offers that we came across left links to these resources rather than contact details. Ordering a DDoS attack is usually done using a full-fledged web service, eliminating the need for direct contact between the organizer and the customer. We also established what exactly the cybercriminals behind DDoS attacks offer their customers. Based on analysis of the data obtained from open sources (for example, offers to organize DDoS attacks on Internet forums or in Tor), we managed to find out the current cost of a DDoS attack on the black market. They are relatively cheap and easy to organize, and can be highly effective if reliable protection is not in place. Often, a DDoS attack is used to distract IT staff while another cybercrime such as data theft or malware injection is carried out.Īlmost anyone can fall victim to a DDoS attack. ![]() There have been cases where criminal groups have threatened their victims with a DDoS attack unless the latter paid 5 bitcoins (more than $5,000). ![]() The motives behind such attacks can vary – from cyber-hooliganism to extortion. A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |