More DDoS attacks will be application based: Gartner

A new class of distributed denial of service (DDoS) has emerged and targeted US banks, says analyst firm.

Gartner US distinguished analyst Avivah Litan.

Gartner US distinguished analyst Avivah Litan.

Hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks, warns Gartner.

According to Gartner's new report called Arming Financial and E-Commerce Services against Top 2013 Cyberthreats, 25 per cent of DDoS attacks to take place this year will be application based.

Gartner said hackers send out targeted commands which put strain on the central processing unit (CPU) and make the application unavailable.

Hackers use DDoS attacks primarily to distract security staff so that they can steal information or money from accounts, the analyst firm said.

How to report a cyber threat to Australian police

How to prepare for a hacktivist attack

Security threats explained: Social engineering

According to Gartner US distinguished analyst Avivah Litan, this new class of application based DDoS attacks were first targeted against banks in the United States during the second half of 2012.

“These attacks sometimes added up to 70 gigabits per second [Gbps] of noisy network traffic blasting at the banks through their Internet pipes,” she said in a statement.

“Until this recent spate of attacks, most network-level DDoS attacks consumed only five Gbps of bandwidth, but more recent levels made it impossible for bank customers and others using the same pipes to get to their websites.”

To combat this risk, Litan said financial services organisations should look at network configurations and re-architect these configurations to minimise the damage.

For example, the companies should employ a layered approach that combines multiple DOS defences.

“Gartner advocates co-operation with industry associations to share intelligence that can be acted on collectively and quickly, as well as enterprise investments in fraud prevention technology and the strengthening of organisational processes,” she said.

Social engineering

Turning to the social engineering aspect of these new attacks, Gartner’s cyber threats report included examples of criminals who have approached people posing as law enforcement agents or bank officers to help them through account migration. The people’s bank accounts were then compromised by the criminal.

“Gartner recommends deploying layered fraud prevention and identity-proofing techniques to help stop the social engineering attacks from succeeding,” Litan said.

“In particular, fraud prevention systems that provide user or account behavioural profiling and entity link analysis are useful in these cases.”

According to Litan, call centre call analytics and fraud prevention software can be deployed to help catch fraudsters committing crimes via social engineering or by using stolen identities.

In addition, banks should educate customers about best security practices to help them avoid phishing attacks and social engineering ploys.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Tags DDoS attacksdistributed denial of service (DDoS)Avivah LitanGartnersocial engineering

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Secure, identity-based protection for your endpoints

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.