Akamai issues the Internet Security Status Report for the first quarter of 2017

May

24

2017

Akamai has released its first quarter 2017 security report, which, based on aggregated data from Akamai’s Smart Home System , provides an analysis of the current full picture of threats and cloud security, as well as in-depth information on attack indicators.

“The most important conclusion we can draw from the first quarter analysis is that the risks on the Internet and targeted industry sectors are still evolving,” said Martin McKay, chief security adviser and chief editor of the Internet / Security Case Report.

“The use of Android networks such as Mirai has continued to evolve and change, as attackers continue to increasingly integrate Internet vulnerabilities into the core of malware and Android networks that launch DDoS attacks. But it is not enough to think that Mirai is the only threat on the scene. With the source code version, any aspect of Miray may be integrated into other robot networks. Even without adding Miray’s capabilities, there is evidence that Android network families such as BillGates, Elknot and XOR are turning to exploit the whole changing picture. ”

Highlights of the report on the state of Internet security for the first quarter of 2017 issued by Akamai include:

DDoS attacks

The report pointed out that the attacks of “DNS pseudo subdomains” also known as the “Water Water Filter” from Miray, a method embedded in the malicious Miray software to flood the server with information, targeted Akamai customers in the financial services sector.

Most of the affected DNS servers received queries at an equal rate during the attacks, with the exception of an attack on 15 January 2017, when one of the three DNS servers received 14 Mbps attacks. Attacks can lead to interruptions in service blocking by randomly consuming target domain resources
On emerging domain names in large numbers.

The report also noted that reflective attacks continued to include the largest number of DDoS attack vectors and accounted for 57% of all lightened attacks in the first quarter of 2017, with SSDP reflectors emerging as the larger attack source.

Web application attacks

According to the report, the United States maintained its position as the leading source of Web application attacks, showing a 57% increase over the first quarter of 2016. The top 5 attack vectors were against Web applications in the first quarter of 2017: SQLi, LFI, and XSS.

The Netherlands, second in the list of first Web application attacks in the first quarter of 2017, saw a decline from 17% to 13% in the last quarter, leaving a steady source of attacks and a large proportion of attacks from a country Its population does not exceed 17 million.

Key Attacks Attacks

UDP, DNS and NTP routers maintained their position as the top 3 DDoS attackers, while protocol dumps and connection dumps were listed on the list of attack vectors for the first quarter of 2017. The three most common attack vectors in the first quarter of 2017 were ACK And CHARGEN and DNS.

A new reflective attack vector known as the CLDAP was detected and monitored and is launching DDoS attacks that can be compared with DNS reflection with the speed of most of the 1 Gbps attacks.

Viewing:-79

In: Technology & Gadgets Asked By: [17240 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »