Cybersecurity: DDoS Attacks Knock Organizations Offline

March 22, 2022
On the cyberattack front, three particular extortion attempts attained prominence in 2021.

Richard Hummel, a threat research lead at Netscout, a cybersecurity, service assurance and business analytics solution provider, discusses three prominent DDoS threat actors of 2021. Distributed Denial of Services (DDoS) extortion campaigns are typically custom-built attack techniques that threaten internet resources. The attacks have been directed at financial and travel industry sectors. However, Hummel said manufacturers of personal care products, energy providers, retail and IT-related vendors are also targeted.

Compromised machines, called Zombies or Handlers, send packets through the network to exhaust communication or computational resources. The variety and number of both the attacks and the defense approaches are overwhelming. That most of these threats do not materialize into actual attacks or are successfully mitigated can be no small comfort relative to the potential reliability risk for manufacturing plants.

The three DDoS attacks named in this video clip are:

  • Lazarus Bear Armada: Attackers demand a ransom in exchange for stopping a DDoS attack. Extortionists targeted multiple verticals worldwide. An attack on the New Zealand Stock Exchange is one example.
  • Fancy Lazarus: An extortionist campaign that targeted authoritative DNS servers of wireline broadband access ISPs in the UK and Scandinavia. The attack is characterized as “somewhat successful” due to the unpreparedness of a few network operators.
  • REvil ransomware: An aggressive series of attacks masquerading as the REvil ransomware group targeted SIP/RTP VoIP operators in the U.K., Western Europe and North America. One VoIP wholesaler filed a form with  the U.S. Securities and Exchange Commission (SEC) estimating the total cost of the DDoS attack at between $9 and $12 million.

Click here to access the Netscout Threat Intelligence Report.

Related Videos

Cybercrime Mitigation: Is Your Critical Infrastructure Secure?

Report: DDoS Cyberattacks Pile Pressure on Critical Manufacturing Sector

Digital Supply Chain: Cybersecurity Report Flags Clear and Present Danger

Related Article

About the Author

Rehana Begg | Editor-in-Chief, Machine Design

As Machine Design’s content lead, Rehana Begg is tasked with elevating the voice of the design and multi-disciplinary engineer in the face of digital transformation and engineering innovation. Begg has more than 24 years of editorial experience and has spent the past decade in the trenches of industrial manufacturing, focusing on new technologies, manufacturing innovation and business. Her B2B career has taken her from corporate boardrooms to plant floors and underground mining stopes, covering everything from automation & IIoT, robotics, mechanical design and additive manufacturing to plant operations, maintenance, reliability and continuous improvement. Begg holds an MBA, a Master of Journalism degree, and a BA (Hons.) in Political Science. She is committed to lifelong learning and feeds her passion for innovation in publishing, transparent science and clear communication by attending relevant conferences and seminars/workshops. 

Follow Rehana Begg via the following social media handles:

X: @rehanabegg

LinkedIn: @rehanabegg and @MachineDesign

Sponsored Recommendations

Pumps Push the Boundaries of Low Temperature Technology

June 14, 2024
As an integral part of cryotechnology, KNF pumps facilitate scientific advances in cryostats, allowing them to push temperature boundaries and approach absolute zero.

The entire spectrum of drive technology

June 5, 2024
Read exciting stories about all aspects of maxon drive technology in our magazine.

MONITORING RELAYS — TYPES AND APPLICATIONS

May 15, 2024
Production equipment is expensive and needs to be protected against input abnormalities such as voltage, current, frequency, and phase to stay online and in operation for the ...

Solenoid Valve Mechanics: Understanding Force Balance Equations

May 13, 2024
When evaluating a solenoid valve for a particular application, it is important to ensure that the valve can both remain in state and transition between its de-energized and fully...

Voice your opinion!

To join the conversation, and become an exclusive member of Machine Design, create an account today!