Saudi Arabia affirms its commitment for a ban on chemical weapons    Saudi Arabia and Morocco emphasize keenness on strengthening cooperation across various realms    EU leaders meet to discuss Ukraine's future as Trump pushes for fast peace deal    Saudi taekwondo champion Dunia Abu Talib tops world rankings, making history    Gaza food prices soar after Israel halts aid deliveries    Boom to gloom: India middle-class jitters amid trillion-dollar market rout    Real-life shipwreck story wins major book award    Bangladesh leader likens Sheikh Hasina regime to 'terrible tornado'    Seven injured after South Korean fighter jet accidentally drops bombs    Islamic Arts Biennale celebrates Ramadan with 'Biennale Nights' in Jeddah    Tawakkalna offers a package of religious services during Ramadan    Ministry ranks Saudi auto dealers — Abdul Latif Jameel has longest waitlist, Al-Naghi records longest delivery time    Haram Authority launches smart luggage storage service New service is available around the clock during Ramadan    New boxing promotion led by Turki Al-Sheikh, TKO, and Sela set to transform the sport    Okaz and Saudi Gazette Esports    Saudi Arabia attracted 2.5 million sports tourists in four years, says ministry    PIF and Italy's SACE sign MoU to boost financial collaboration with up to $3 billion in project support    Nora Razian and Sabih Ahmed appointed artistic directors for 2026 Diriyah Contemporary Art Biennale    Al Hilal stumble in Tashkent as Pakhtakor claim first-leg advantage in AFC Champions League Round of 16    HONOR unveils New Corporate Strategy to Transition to an AI Device Ecosystem Company Illuminating a three-step roadmap underpinned by openness and collaboration    King Salman prays for peace and stability for Palestinians in Ramadan message King reaffirms Saudi Arabia's commitment to serving the Two Holy Mosques and pilgrims    Bollywood star Saif Ali Khan 'out of danger' after attack at home in Mumbai    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



5 common motives for DDoS attacks
Published in The Saudi Gazette on 11 - 06 - 2016

of-service (DDoS) attacks continue to be one of the most prevalent methods hackers use to disrupt businesses. Involving the use of multiple systems (personal computers, smartphones, etc.), DDoS attacks overload an organization's network by generating web traffic that can't be accommodated by the system's capacity limits.
Unlike with other forms of cyber attacks, DDoS attackers run the gamut in terms of their technical prowess. With DDoS services available for purchase online, even the least tech-savvy teenager with a credit card is capable of taking down company web assets for hours and even days.
Due to the diversity amongst those carrying out DDoS attacks, ranging from high-school kids to state-sponsored hackers, the purpose behind separate incidents can vary significantly. For example, while an experienced cyber criminal may use a DDoS attack for diversionary purposes, a disgruntled employee may carry out an attack just for the sake of causing chaos.
Chris Gale, EMEA Partner Director at A10 Networks at A10 Networks has mapped out some of the most common motives for these attacks and describes the tell-tale signs that will help companies in Saudi combat these cyber attacks:
Hit-and-Run
The least sophisticated form of DDoS is the hit-and-run attack. These come in a wide variety, targeting gaming services, consumer websites and various other high-visibility targets. These attacks aren't typically very strategic and are commonly executed by hackers causing chaos for attention or young cyber criminals testing their chops.
Considering these attacks are typically the least organized, and pulled off by the least technical individuals, they are the easiest to prevent. Unskilled troublemakers typically will use a paid service to pull off the attacks, making it costly to sustain long-term. By optimizing your network configuration, and utilizing technology with robust load balancing capabilities, the risks posed by these attacks are greatly minimized.
This category of attacks serves as a grab-all for incidents that don't fit into the more defined versions of a DDoS attack. As they are often poorly organized attacks on random companies, it is difficult to pin down specific warning signs. If you are a high-profile company that would make for good headlines, you can assume you've been the target of this sort of incident.
Political
Government and state-run websites have been a common target for protesters and activists looking to make a statement via cyber means. Most commonly associated with the likes of Anonymous and other hacker collectives, these attacks are a slightly more advanced/targeted version of the hit-and-run. There is no true end-game in terms of tangible payoff — these attacks tend to be symbolic in nature.
By taking down government web assets, attackers cause headaches for officials looking to both save face and bring critical services back online. While there is little payoff for the hacktivists, the damage caused to operations and reputation is very real.
Fiscal
The ease of pulling off a rudimentary DDoS attack means that the hackers aren't always the usual suspects. For example, a recent survey from Kaspersky Labs found that 48 percent of companies who had experienced a DDoS attack believed their competition was responsible. While these statistics may be slightly inflated due to human paranoia, at least some of the attacks being reported fall into the category of B2B cyber crime.
Along with causing productivity declines that reduce the efficiency of a key competitor, companies perpetrating these attacks also aim to damage the target's reputation. While there are no direct monetary gains for the perpetrator, the indirect benefit of not having yourself associated with a cyber attack is enough to draw customers away from the competition.
Smokescreen
Hackers have increasingly turned to DDoS attacks as a means of diverting IT's attention away from separate, and often times more damaging, behavior. When an attacker damages or completely brings down a company's network, the process for complete remediation can take days. Coupled with the fact that DDoS attacks are highly visible, both externally and internally, returning to business as usual becomes priority one for responders.
With the IT team's attention focused elsewhere, it is easy for otherwise alarming behavior to slip through the cracks. False-positives are already a common headache for those monitoring network activity, and during a time of crisis, it becomes much easier to neglect best practices and allow for incidents such as malware injection or data theft to occur.
You typically don't realize a DDoS attack is being used as a smokescreen for a larger security incident until it's too late. The best defense comes from ensuring that all normal cybersecurity processes are continued in the wake of an attack and never assuming the worst is over.
Ransom
The last form of attack has the most obvious pay off for hackers: cold hard cash (or at least cold hard cryptocurrency). For companies involved in e-commerce, stock trading, customer service and basically any form of business requiring access to a website or portal, extended network downtime is not an option.
Depending on the resources of attackers, sophisticated DDoS attacks on improperly secured networks can be extended for days, costing companies thousands and even millions of dollars in lost business. Attackers know this and prey on businesses looking to cut their losses and pay their way out of the situation. The good news is these attacks are easy to categorize since they come in conjunction with a communication demanding a ransom. The bad news is the price tag (usually requested in Bitcoin) is at the complete discretion of the attacks, and as more companies pay up, the demands are only bound to increase. — SG


Clic here to read the story from its source.