Mounting Denial-of-Service (DDOS) attacks is undoubtedly an arcane tactic considering the evolutionary timeline of cyber-defenses, but ‘going old-school’ does pay off when one’s engaged in a fast-paced, counter-for-threat trade-off. Recently, Heimdal™ investigated a massive surge in DDOS-type attacks, proving the old adage: “there’s no retreat, we’re just advancing in another direction”. In this article, we’re going to take a closer look at the event and discuss in-depth defensive strategies.
Distributed Denial-of-Service (DDOS): A farewell to arms or Blatant Comeback?
Before we consider this topic, I want to clarify an aspect – volumetric, DDOS-based attacks such as ICMP flooding, IP/ICMP flooding, IPSec flooding, UDP flooding, or Reflection Amplification Attacks may be considered relict by today’s standards, but certainly not dead. Despite us lobbying for better anti-DDOS security, there are still many devices that are susceptible to volumetric attacks and, in some rare occurrences – as is this case – even the most advanced protection can falter. For security and confidentiality reasons, I will refrain from disclosing names, industries, post-DDOS effects, or any type of PII.
The context is as follows…
On the 16th of June 2022, Heimdal™ was solicited to investigate the anomalous timing-out of a WordPress-based stack. Having ruled out