Last week, Akamai claimed to have observed and thwarted a massive DDoS attack targeting one of its “largest and most influential”, American financial institution.
Usually, almost all the legitimate traffic to the company’s site comes from the U.S., but during the 2-minute attack there was 633.7 gigabits of traffic per second from all over the world, including Bulgaria, Brazil, China, India, Thailand, Russia, Ukraine, Vietnam, and Japan.
The attack went directly after their primary web landing page with a likely intent to disrupt their online banking, according to Akamai. The incident didn’t harm or disrupt services, but given the magnitude of the attack, the financial company would have faced severe disruptions to its vital web systems had it not been mitigated.
Since 2021, there has been an increase in the number of DDoS attacks against financial services and over the past year, more than 30% of the DDoS attacks detected by Akamai have been aimed at financial services.
“Financial institutions are a key pillar of an economy, and targeting such businesses often has a larger impact on the overall economy,” Akamai researchers said.
Emily Phelps, Director, Cyware had this comment:
“While financial institutions should pay close attention to the escalating attacks aimed at banks, enterprises across all sectors should take notice and ensure they have appropriate protections in place. Threat actors are not loyal to hitting one particular industry if the opportunity presents itself elsewhere.
As DDoS attacks grow in scale and frequency, organizations must adopt more proactive measures to safeguard against such threats. Enterprises should regularly evaluate their risks and vulnerabilities and stay updated on the latest DDoS tactic, updating their defenses accordingly.
Dave Ratner, CEO, HYAS had this follow up:
“The attack highlights that a chain is only as strong as its weakest link — in this case, one user likely following a malicious link amongst the hundreds that were delivered. Even the smartest of professionals will occasionally make mistakes or be fooled. It has never been more clear that Protective DNS solutions, capable of catching that mistake when a user clicks on a nefarious link, are required as part of a depth-in-depth strategy.”
DDoS attacks are easy to carry out and are devastating in nature. Thus this should be added to the ever growing list of things that organizations need to protect themselves against.
Malicious USPS Phishing Sites Exceed The Traffic Of The Real Site
Posted in Commentary with tags Akamai on April 29, 2024 by itnerdAccording to a recent blog post by Akamai Technologies, security researchers analyzing phishing campaigns targeting the United States Postal Service saw traffic to the fake domains similar to that of the legitimate site and during the holidays it “greatly exceeded legitimate traffic”.
Akamai started observing USPS-themed phishing last October after an employee received a suspicious text that redirected to a site containing malicious JavaScript code. During the 2023 holiday season, researchers observed a significant volume of DNS queries going to “combosquatting” domains that impersonated the USPS service.
The design of the fake pages appears as exact replicas of the actual USPS site even with realistic tracking pages with status updates. The total queries generated by these malicious websites between October 2023 and February 2024 is over 1,128,146, just short of the 1,181,235 queries recorded for the legitimate USPS site. Meanwhile, the traffic to malicious domains from November to December was higher compared to the legitimate one.
Akamai only focused this research on USPS, so the scale of these combosquatting campaigns could encompass other postal brands and likely be larger.
Dave Ratner, CEO, HYAS had this to say:
“Attacks involving typosquatting, combosquatting, or look-alike domains are increasing in nature and can be highly effective as individuals often don’t inspect the domain name itself closely enough. This can be made more complicated and difficult to detect with the use of different character sets like punycode which can make the difference between the legitimate and fake domain very hard, if at all possible, to detect by visual inspection. This is one of the reasons that Protective DNS solutions are so vital today, because they know the legitimate domains from the fake ones and can be the critical difference between a successful attack and a failed attempt.”
This is pretty insane. The fact that the real USPS site gets less traffic than fake ones shows that this is a huge problem that really needs to be addressed. I am not sure how one would address this, but it’s high time to figure it out.
Leave a comment »