{"id":15119,"date":"2015-12-11T18:43:12","date_gmt":"2015-12-11T18:43:12","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4927"},"modified":"2020-02-26T18:58:30","modified_gmt":"2020-02-26T16:58:30","slug":"ddos-whodunnit","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/ddos-whodunnit\/15119\/","title":{"rendered":"DDoS attacks and the question of “whodunnit”"},"content":{"rendered":"<p>Nearly half of companies recently surveyed by Kaspersky Lab and B2B International think they know who to blame for DDoS attacks targeted at them. While it isn’t easy to prove, many think it is competitors orchestrating these attacks.<\/p>\n<p>The <a href=\"https:\/\/press.kaspersky.com\/files\/2015\/09\/IT_Risks_Survey_Report_Threat_of_DDoS_Attacks.pdf\">Corporate IT Security Risks Survey<\/a> was conducted globally with more than 5,500 companies from 26 countries participating.<\/p>\n<p>20% of companies with 50+ employees reported to have been the victim of at least one DDoS attack. The top “risk groups” are telecoms, financial services, and IT. 50% of DDoS attacks led to a noticeable disruption of services and 24% led to their total unavailability.\u00a074% of attacks that led to a noticeable disruption of service coincided with a different type of security incident, such as a malware attack, network intrusion, or\u00a0other type of attack – in other words, DDoS attacks were used as a smokescreen.\u00a026% of DDoS attacks led to the loss of sensitive data.\u00a0As always, among the burning questions for businesses, “whodunnit” stands out.<\/p>\n<p>At least, after the fire has been extinguished.<\/p>\n<p><strong>Top suspects<\/strong><\/p>\n<p>The lion’s share of the “pie”, as can be seen below, is attributed to criminals seeking to disrupt the business’ operations. Two other sectors are also attributed to criminals: 18% of the surveyed said the DDoS attacks were motivated to disrupt services or distract attention from another, more clandestine kind of attack, and 17% of the surveyed said criminals launched their attacks and demanded ransom.<\/p>\n<p>A surprisingly high percentage of the surveyed are sure their competitors orchestrated the DDoS attacks: 12%. Slightly less consider themselves the victims of political activists (11%), twice less – of governments\/state powers (5%).<\/p>\n<p>And just 8% have no idea who might have wanted to DDoS them.<\/p>\n<p><strong>Prevention instead of repair<\/strong><\/p>\n<p>DDoS attacks cost. A lot. As previously reported, on average, enterprises lose $417,000 as a result of a denial of service attack and SMBs lose $53,000. For large companies, DDoS is the 9th most expensive type of a breach, but for SMBs it’s the fourth most expensive, and the amount of loss is comparable to such incidents as network intrusion ($56K) and cyber espionage ($69K \u2013 the largest average recovery budget for SMBs). And we speak here about “isolated” damage from DDoS. If they are used as a decoy for other hostile activities, the damage may appear far greater.<\/p>\n<p>Unfortunately, businesses still tend to view DDoS protection systems as something expensive (even prohibitively expensive at times) and complex. DDoS attacks are easy to launch, hard to beat, but at the same time they are not so omnipresent as spam and malware. Because of this, businesses often prefer to take risks, in hopes that they won’t be hit any time soon – but this is wishful thinking, not a practical approach.<\/p>\n<p>In practice, security vendors such as Kaspersky Lab offer potent and efficient means to defend businesses from DDoS attacks. Taking technical challenges upon ourselves, we offer Kaspersky DDoS Protection solution, a protective complex to shield businesses from threat of DDoS-attacks.<\/p>\n<p>Kindly proceed via <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/ddos-protection\">this link<\/a> to find out the working principles of this solution and what makes it effective.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nearly half of companies recently surveyed by Kaspersky Lab and B2B International think they know who to blame for DDoS attacks targeted at them. While it isn’t easy to prove, many think it is competitors orchestrating these attacks.<\/p>\n","protected":false},"author":209,"featured_media":15510,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1999,3021],"tags":[1058,119],"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ddos-whodunnit\/15119\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ddos-whodunnit\/15119\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ddos-whodunnit\/15119\/"}],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/ddos\/","name":"ddos"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15119"}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=15119"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15119\/revisions"}],"predecessor-version":[{"id":26632,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15119\/revisions\/26632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15510"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=15119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=15119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=15119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}