{"id":4217,"date":"2022-01-11T19:53:45","date_gmt":"2022-01-11T14:23:45","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=4217"},"modified":"2022-01-11T19:53:47","modified_gmt":"2022-01-11T14:23:47","slug":"why-extortion-ddos-attacks-become-stronger-and-more-frequent","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/","title":{"rendered":"Why Extortion DDoS Attacks Become Stronger and More Frequent?"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">At the end of 2021 saw an increase in the number of distributed denial-of-service incidents that came with a ransom demand from the threat actors to stop the violation. In the fourth part of last year, about a quarter of Cloudflare\u2019s customers that were the target of a DDoS attack said that they get a ransom note from the perpetrator.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image1.png\" alt=\"Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image1\" class=\"wp-image-4219\" width=\"732\" height=\"366\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image1.png 1000w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image1-300x150.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image1-768x384.png 768w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">A large quarter of these attacks occurred in December 2021, when almost a third of Cloudflare customers reported receiving a ransom letter. By contrast with the previous month, the number of reported DDoS ransom attacks was double, Cloudflare says in content today.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image2.png\" alt=\"Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image2\" class=\"wp-image-4220\" width=\"668\" height=\"334\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image2.png 1000w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image2-300x150.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-image2-768x384.png 768w\" sizes=\"(max-width: 668px) 100vw, 668px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How it increases?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">According to the company, 2021 is when most of these attacks happened, with a 29% recorded year-over-year increase and a 175% quarter-over-quarter jump. Extortion or ransom DDoS (RDDoS) attacks started to become a new threat in August 2020 and grew bigger and more complex since then.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">They started around 200Gbps and then turned to more additional than 500Gbps in mid-September. In February 2021, internet security services company Akamai saw its percentage of a challenge marketing with an 800Gbps RDDoS that targeted a gambling company in Europe.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Last September, a threat actor deployed an RDDoS against VoIP.ms voice-over-Internet provider, disrupting phone services as the company\u2019s DNS servers became unreachable.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the <strong>Terabit-large attacks?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Cloudflare says that application-layer DDoS attacks, HTTP DDoS ones, in particular, targeted manufacturing companies and saw a spike of 641% in contrast to the third quarter of 2021. Looking at the IP addresses, most of these DDoS incidents originate from China, the U.S., Brazil, and India, deployed by botnets such as Meris, which emerged this year with a record-breaking assault of 21.8 million requests against Russian internet giant Yandex.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Unlike an application-layer DDoS, which denies users access to a service, a network-layer DDoS attack targets the entire network infrastructure of a company trying to take down routers and servers. One of the largest DDoS attacks that Cloudflare mitigated lasted for 60 seconds and came from a botnet with 15,000 systems that hurled close to 2Tbps of junk packets at a customer.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">While this is not the largest DDoS attack recorded to date, \u201cterabit-strong attacks are becoming the norm,\u201d Cloudflare says. This one was deployed from a network of IoT devices running compromised by a variant of the Mirai botnet.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Cloudflare notes that SYN floods remain a popular attack method. The SNMP protocol has seen a dramatic spike of almost 6,000% from one quarter to another, although UDP-based DDoS attacks were the second most used vector.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cWhen we look at emerging attack vectors \u2014 which helps us understand what new vectors attackers are deploying to launch attacks \u2014 we observe a massive spike in SNMP, MSSQL, and generic UDP-based DDoS attacks\u201d &#8211; Cloudflare<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Organizations marketing with short-lived DDoS seizures, which are more recurring, should shift to an automated mitigation solution because it operates on the spot and prevents assault on the spot.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the end of 2021 saw an increase in the number of distributed denial-of-service incidents that came with a ransom demand from the threat actors to stop the violation. In the fourth part of last year, about a quarter of Cloudflare\u2019s customers that were the target of a DDoS attack said that they get a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Extortion DDoS Attacks Become Stronger and More Frequent? - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Extortion DDoS Attacks Become Stronger and More Frequent? - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"At the end of 2021 saw an increase in the number of distributed denial-of-service incidents that came with a ransom demand from the threat actors to stop the violation. In the fourth part of last year, about a quarter of Cloudflare\u2019s customers that were the target of a DDoS attack said that they get a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-11T14:23:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-11T14:23:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Why Extortion DDoS Attacks Become Stronger and More Frequent?\",\"datePublished\":\"2022-01-11T14:23:45+00:00\",\"dateModified\":\"2022-01-11T14:23:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\"},\"wordCount\":487,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\",\"url\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\",\"name\":\"Why Extortion DDoS Attacks Become Stronger and More Frequent? - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2022-01-11T14:23:45+00:00\",\"dateModified\":\"2022-01-11T14:23:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Extortion DDoS Attacks Become Stronger and More Frequent?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Extortion DDoS Attacks Become Stronger and More Frequent? - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/","og_locale":"en_US","og_type":"article","og_title":"Why Extortion DDoS Attacks Become Stronger and More Frequent? - Xiarch Solutions Private Limited","og_description":"At the end of 2021 saw an increase in the number of distributed denial-of-service incidents that came with a ransom demand from the threat actors to stop the violation. In the fourth part of last year, about a quarter of Cloudflare\u2019s customers that were the target of a DDoS attack said that they get a [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2022-01-11T14:23:45+00:00","article_modified_time":"2022-01-11T14:23:47+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/Why-Extortion-DDoS-Attacks-Become-Stronger-and-More-Frequent-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Why Extortion DDoS Attacks Become Stronger and More Frequent?","datePublished":"2022-01-11T14:23:45+00:00","dateModified":"2022-01-11T14:23:47+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/"},"wordCount":487,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/","url":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/","name":"Why Extortion DDoS Attacks Become Stronger and More Frequent? - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2022-01-11T14:23:45+00:00","dateModified":"2022-01-11T14:23:47+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/why-extortion-ddos-attacks-become-stronger-and-more-frequent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Extortion DDoS Attacks Become Stronger and More Frequent?"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4217"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=4217"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4217\/revisions"}],"predecessor-version":[{"id":4222,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4217\/revisions\/4222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/4221"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=4217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=4217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=4217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}