A quarterly assessment focused on distributed denial-of-service (DDoS) attacks around the world found that security researchers working
to detect and blunt cyber attacks are themselves in the crosshairs.
According to a threat report released
this week by the threat analysis firm Nexusguard, "Researchers and
their related groups are becoming high-valued targets for digital
criminals." The company added, "We have seen this in the past, but never
as a primary target for a whole quarter."
Along with being the top target of hackers, the report found that the No. 1 attack method launched against cyber researchers and corporate infrastructure was network time protocol (NTP), an exploit that targets the network protocol used for clock synchronization between computers linked by packet-switched data networks with varying levels of latency.
San Francisco-based Nexusguard, a DDoS mitigation firm, reported that some victims were attacked on a daily basis. The security analyst also found that most attacks lasted less than 10 minutes. "The decrease in duration could be related to the continued rise in popularity of DDoS-for-hire services, which have led to shorter attack times," the threat report noted.
Along with being the top target of hackers, the report found that the No. 1 attack method launched against cyber researchers and corporate infrastructure was network time protocol (NTP), an exploit that targets the network protocol used for clock synchronization between computers linked by packet-switched data networks with varying levels of latency.
San Francisco-based Nexusguard, a DDoS mitigation firm, reported that some victims were attacked on a daily basis. The security analyst also found that most attacks lasted less than 10 minutes. "The decrease in duration could be related to the continued rise in popularity of DDoS-for-hire services, which have led to shorter attack times," the threat report noted.
Комментариев нет:
Отправить комментарий