Story image

DDoS attacks on the rise, Android more vulnerable than iOS

11 Mar 2016

Businesses of all sizes are continuing to face distributed denial of service (DDoS) attacks, and the size of these attacks targeting businesses are getting bigger every year. 

That’s according to Check Point, who says it is critical that organisations protect themselves against such attacks.

The company has found that in January, DDoS attacks are on the rise.

In December 2015, Check Point saw the number of active malware families increase by 25%. Now, Check Point’s ThreatCloud World Cyber Threat Map has identified more than 1500 different malware families during January, continuing the growing trend the company saw at the end of last year.

According to Check Point research, Conficker and Sality were the top two malware families commonly used. 

“This is no surprise, as Conficker and Sality have been trading places at the top malware list during the last few months,” the company explains.

However, the third spot had been taken by a new entry: Dorkbot, a malware associated with DDoS attacks and exploits targeting sensitive data, was responsible for 5% of attacks during the month.   The top three malware families, which accounted for 39% of the total attacks in January, were:

Conficker  Accounting for 24% of all recognised attacks, machines infected by Conficker are controlled by a botnet. It also disables security services, leaving computers even more vulnerable to other infections.

Sality  A virus that allows remote operations and downloads of additional malware to infected systems by its operator. Its objective is to persist in a system and provide means for remote control and installing further malware.

Dorkbot  An IRC-based worm designed to allow remote code execution by its operator, as well as download additional malware to the infected system, with the primary motivation being to steal sensitive information and launch denial-of-service attacks.

“The rising surge of Dorkbot shows that hackers are increasingly using DDoS to bring down businesses, proving how popular and effective the attack method has become,” Check Point says.

Check Point’s research also revealed mobile attacks against Android devices were significantly more common than iOS. 

The top three mobile malware were AndroRAT, Xinyin, and Leech.

“DDoS attacks have always been a huge concern, but most businesses make the common mistake of relying on traditional solutions and waiting until they have been the target of a DDoS attack before implementing the proper protections,” the company says. 

“As the scale and length of cyberattacks continue to grow, it’s important that organisations think proactively and deploy security solutions to help defend against their business from the latest threats.”

Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Deakin Uni scores double win with Exabeam partnership
Australia’s Deakin University is partnering with SIEM security company Exabeam in an effort to boost the university’s cybersecurity degree program and strengthen its SIEM capabilities.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Voter vulnerabilities: Cybersecurity risks impact national elections
The outcome of elections have an enormous impact on the political and cultural landscape of any democratic society. 
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."