DNS software specialist Nominum has revealed that DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers worldwide.
The research reveals that more than 24 million home routers have open DNS proxies which potentially expose ISPs to DNS-based DDoS attacks.
Today we are releasing a DDoS Threat Landscape report which provides several important, and often surprising, facts about DDoS activity in 2013 and the beginning of 2014.
When we started working on this report back in January, our goal was to provide a recap of 2013 DDoS trends. However, the offenders had other plans. And so, just as we were preparing for the report to come out, we started encountering new types of DDoS events which were too significant to overlook.
One of the largest distributed denial-of-service attacks (DDoS) ever seen hit the Internet Feb. 11, cloud security vendor CloudFlare reported.
The target was a CloudFlare customer, and the attack appears to have been just shy of 400G bps, Matthew Prince, the company's CEO, told eWEEK. "We're still gathering data from all our upstream providers to get the exact scale."
Distributed denial-of-service (DDoS) attacks have scaled up in the past year, according to Arbor Networks' latest Infrastructure Security Report (PDF), and many attackers are learning from each other to meet their objectives.
Those surveyed in the study, around 220 operational security professionals, reported that DDoS attacks are the number one threat against their infrastructure.
Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.