News

DDoS Attacks: A Flourishing Business for Cybercrooks – Podcast

  • None--threatpost.com
  • published date: 2021-09-16 09:00:00 UTC

Imperva’s Peter Klimek on how DDoS attacks started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,

<div class="c-article__content js-reading-content"> <p>Distributed denial-of-service (DDoS) started out as an inconvenience: They were a roadblock that kept customers from getting at systems.</p> <p>That’s bad enough. Keeping availability away from customers via DDoS can have a painful impact on businesses as they find their doors blocked to customers, keeping them from making transactions.</p> <p>But over the years, <a href="https://www.imperva.com/resources/resource-library/reports/ddos-threat-landscape-report/" rel="sponsored,nofollow">DDoS attacks have evolved</a> regarding level of sophistication, metrics and the techniques that threat actors employ.</p> <p><a href="https://threatpost.com/infosec-insider-subscription-page/?utm_source=ART&amp;utm_medium=ART&amp;utm_campaign=InfosecInsiders_Newsletter_Promo/" target="_blank" rel="noopener"><img class="aligncenter wp-image-168544 size-full" src="https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/10165815/infosec_insiders_in_article_promo.png" alt="Infosec Insiders Newsletter" width="700" height="50"></a></p> <p>According to Peter Klimek, director of technology in the office of the CTO at Imperva, DDoS attacks have blossomed into what he calls a huge business for cybercriminals. “Looking at it from a business perspective, that’s really the big impact and are why businesses should start considering DDoSes as “a consistent and persistent threat.”</p> <p>“As a whole, there’s really a low barrier to entry in order to actually perform the [DDoS] attack itself,” he said. “And there’s a high capacity for damage or a high potential for it leading to damage.”</p> <p>Take the services known as booters, aka stressors: “They can be had and used for as little as the price of a cup of coffee,” Klimek observed, and “Even a small scale DDoS attack can cause disruption.”</p> <p>Because of the low technical acumen that’s required to launch lower-scale attacks, a poorly defended network can be taken down “for as little as a hundred dollars.”</p> <p>Klimek visited the Threatpost podcast recently to discuss the evolution of DDoSes and other trends that he and his team have unearthed.</p> <p>Listen to the full podcast below, or <a href="https://traffic.libsyn.com/digitalunderground/091321_Imperva_sponsored_podcast_mixdown.mp3" target="_blank" rel="noopener">download it directly here</a>.</p> <p></p><div class="c-video-container"><iframe loading="lazy" style="border: none" height="360" scrolling="no" src="//html5-player.libsyn.com/embed/episode/id/20474888/height/360/theme/legacy/thumbnail/yes/direction/backward/" width="100%"></iframe></div> <p><b>It’s time to evolve threat hunting into a pursuit of adversaries. </b><a href="https://threatpost.com/webinars/threat-hunting-catch-adversaries/?utm_source=ART&amp;utm_medium=ART&amp;utm_campaign=September_Cybersixgill_Webinar"><b>JOIN</b></a><b> Threatpost and Cybersixgill for </b><a href="https://threatpost.com/webinars/threat-hunting-catch-adversaries/?utm_source=ART&amp;utm_medium=ART&amp;utm_campaign=September_Cybersixgill_Webinar"><b>Threat Hunting to Catch Adversaries, Not Just Stop Attacks</b></a><b> and get a guided tour of the dark web and learn how to track threat actors before their next attack. </b><a href="https://threatpost.com/webinars/threat-hunting-catch-adversaries/?utm_source=ART&amp;utm_medium=ART&amp;utm_campaign=September_Cybersixgill_Webinar"><b>REGISTER NOW</b></a><b> for the LIVE discussion on September 22 at 2 PM EST with Cybersixgill’s Sumukh Tendulkar and Edan Cohen, along with researcher and vCISO Chris Roberts and Threatpost host Becky Bracken.</b></p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="DDoS Attacks: A Flourishing Business for Cybercrooks – Podcast" data-url="https://threatpost.com/ddos-attacks-a-flourishing-business-for-cybercrooks-podcast/169473/" data-counters="no" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/podcasts/">Podcasts</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/sponsored/">Sponsored</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/web-security/">Web Security</a></li> </ul> </div> </div> </footer> </div>