6、安全厂商发布Q3期间DDoS攻击统计报告
标题:Kaspersky DDOS intelligence report for Q3 2016
作者信息:October 31, 2016. 8:57 am By Oleg Kupreev, Jens Strohschneider, Alexander Khalimonenko
//BEGIN
Q3 events
Cybercrime as a Service
In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity.
在过去的一个季度中,Cybercrime as a Service (网络犯罪作为一种服务)逐渐商业化。而这其中DDOS攻击是最流行的攻击方式,虽然它很古老,但是我们依然发现了其采用的技术的复杂性以及攻击的流量的巨大性。
//END
‘Classic’ botnet attacks based on widespread malware tools such as Pandora, Drive, etc. have been well researched by analysts who have developed effective and simple methods of neutralizing attacks that utilize these tools. This is increasingly forcing cybercriminals to use more sophisticated attack methods, including data encryption and new approaches to the development of tools used for organizing attacks and building botnets.
Another interesting trend this quarter was the increased activity of DDoS botnets in Western Europe. For the first time in a year the TOP 10 most attacked countries included three Western European countries – Italy, France and Germany. This correlates with the increased number of active C&C servers in Western Europe, particularly in France, the UK and the Netherlands. Overall, Western European countries accounted for about 13% of active DDoS botnet C&C servers.
传统意义上的僵尸网络已经被研究人员分析得比较彻底,而且已经出现了比较有效和简单的方式来化解其风险。这在很大程度上迫使网络攻击者们提高自身的技术水平,同时寻找新的攻击渠道和方式:比如采用数据加密以及采用新的开发工具平台等。另外一个趋势是在西欧的DDOS攻击主机的数量在增加:比如意大利、法国和德国等。2016年的第三季度西欧国家的有效DDOS的C2地址增加了大约13%,这些国家分布在法国、英国以及荷兰等。
//下载:
europol_iocta_web_2016.rar
(6.52 MB, 下载次数: 360)
文件名:europol_iocta_web_2016.pdf
文件大小:11,676,896 bytes
MD5 : 0E0B6E39869114BC06B3CAE803A36FD2
主要内容:欧盟2016年互联网有组织犯罪风险评估报告
点评:古老的DDOS因为IoT等物联网设备参与而变得热闹起来..... |