Heimdal Security Blog

Heimdal™ Security Researchers Discover Massive Surge in DDoS Attacks

Mounting Denial-of-Service (DDoS) attacks is undoubtedly an arcane tactic considering the evolutionary timeline of cyber-defenses, but ‘going old-school’ does pay off when one’s engaged in a fast-paced, counter-for-threat trade-off. Recently, Heimdal™ investigated a massive surge in DDoS-type attacks, proving the old adage: “there’s no retreat, we’re just advancing in another direction”. In this article, we’re going to take a closer look at the event and discuss in-depth defensive strategies.

Distributed Denial-of-Service (DDoS): A farewell to arms or Blatant Comeback?

Before we consider this topic, I want to clarify an aspect – volumetric, DDoS-based attacks such as ICMP flooding, IP/ICMP flooding, IPSec flooding, UDP flooding, or Reflection Amplification Attacks may be considered relict by today’s standards, but certainly not dead. Despite our lobbying for better anti-DDoS security, there are still many devices that are susceptible to volumetric attacks. In some rare occurrences – as is this case – even the most advanced protection can falter. For security and confidentiality reasons, I will refrain from disclosing names, industries, post-DDoS effects, or any type of PII.

On the 16th of June 2022, Heimdal™ was solicited to investigate the anomalous timing-out of a WordPress-based stack. First we ruled out the usual suspects:

Then we proceeded to gather additional intel on the incident:

The data our company was commissioned to process revealed that the client’s server downtime was not the result of arbitrariness, but a massive Distributed Denial-of-Service (DDoS) attack. Was it on purpose or was the client a victim of chance? Our analysis uncovered the following facts:

Countering DDoS Attacks and Mitigating After-Effects

As with other types of volumetric attacks, the ‘recipe’ to preventing, countering, and mitigating the effects of a DDoS attack is a blend between IP blacklisting and load balancing. Reconfiguring your web browsers can also help you even the playing field. What can you do to protect your company and its assets against DDoS? Here are some tips to get you started.

‘Filtering’ our browsers

Attackers may employ ‘under-the-counter’ browsers in order to mount DDoS attacks. Tweaking the ‘allowed browsers’ function in your firewall can help you filter out most of the web browsers an attacker might leverage for malicious purposes. For instance, firewall custom rule-setting may enable your endpoints to receive/transmit requests from known (and secure) browsers such as Opera, Brave, or Firefox while rejecting transmission to and from less secure web browsers (e.g., Yandex, Baidu, Tor).

Know your enemy

Tzu’s famous line bodes well with cybersecurity. Knowing your DDoS can give you an edge when it comes to protection and mitigation. Here’s a quick list of attack sub-types and how to protect against them.

Custom rulesets for your routers and firewalls.

Consider reconfiguring your routers and firewalls to discard invalid IP addresses or nonessential comm protocols.

IDS (Intrusion-Detection Systems)

These systems can greatly enhance your detection capabilities and automate defense responses in case of DDoS attacks.

Purchasing additional hardware and software resources

Because DDoS is all about volume, you may consider buying additional bandwidth or network devices in order to balance out the loads.

Riding out the storm

Unfortunately, in some cases, even with all the defenses in place, the attack will still happen. The best tactic would be to wait, assess the damage, get everything operational as soon as possible, investigate the incident, and come up with better strategies.

If you liked this article, make sure to follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics. Also, if you’re concerned about the perspective of DDoS attacks, reach out at sales.inquiries@heimdalsecurity.com to discuss in-depth protection strategies.