The recently released Dark Web Price Index 2020 reveals the current average prices for a selection of cybercrime products and services available on demand. A basic targeted malware attack in Europe or the U.S. costs $300, while a targeted distributed denial-of-service (DDoS) attack goes for as little as $10 per hour or $60 for 24 hours. The "salespeople" even offer volume discounts, making such attacks the go-to weapon for online extortion.
According to Nexusguard’s 2020 Threat Report, in the first quarter (Q1) of this year, DDoS attacks increased by more than 278% compared to Q1 2019, and by more than 542% compared to the previous quarter.
According to Gartner research, the average cost of downtime for a small- to medium-sized business is $5,600 per minute. The World Economic Forum's "Global Risks Report 2020" reveals that, in the U.S., the chances of catching and prosecuting a cybercrime actor are almost nil (0.05%). At the same time, the impact on the targeted companies’ business is massive. IBM's "Cost of a Data Breach Report" pegs the average cost of a security breach at $3.92 million.
Suffering a DDoS attack could be inevitable, especially if the business operates in a high-risk industry. Regardless, all organizations should incorporate a DDoS response procedure into their official business continuity plans. According to Ponemon Institute research, firms that can respond to a security incident quickly and contain the damage can save 26% or more on the total costs of the event clean-up.
‘’One reason why DDoS attacks are so inexpensive is that more and more people that offer DDoS-for-hire services are leveraging the scale and bandwidth of public clouds,” said Juta Gurinaviciute, CTO, NordVPN. “With remote work becoming the new standard and with emphasis on home internet connectivity at an all-time high, proper security measures to mitigate these attacks have never been more important.”
What is a DDoS attack?
Distributed denial of service (DDoS) attacks are a serious threat to modern network security. Their goal is to take down the target by either flooding traffic or triggering a crash. These attacks are often sourced from virtual machines in the cloud rather than from the attacker’s own machine, which is done to achieve anonymity and higher network bandwidth.
Typically, these types of attacks are run through botnets — networks of computer devices hijacked and infected by bots to carry out various scams and cyberattacks. A bot is a piece of malicious software that gets orders from another device or attacker. A computer becomes infected when a worm or virus installs the bot, or when the user visits a malicious website that exploits a vulnerability in the browser.
‘’These days, because of the COVID-19 pandemic, organizations around the globe are embracing remote work at unprecedented rates,” Gurinaviciute said. “This has made online services of all kinds — from governments to banks and e-commerce to e-learning — more vulnerable to criminals and DDoS attacks more alluring as a means of extortion. Such attacks don't cost much and can produce excellent returns. When online connections are stopped or significantly slowed for even a few hours, employees' work is disrupted, and customers can't buy anything, which all leads to damaged revenues and public image of the organization.”
How to protect company data
Without early threat detection and traffic profiling systems, it’s impossible to know a DDoS attack has occurred. In fact, it can only be discovered when the website slows down or comes to a complete halt.
These attacks target data, applications, and infrastructure simultaneously to increase the chances of success. To fight them, an integrated security strategy protecting all infrastructure levels is necessary.
Develop a Denial of Service response plan. Make sure the data center is prepared, a checklist is in place, and the team is aware of their responsibilities.
- Secure network infrastructure. This includes advanced intrusion prevention and threat management systems — which combine firewalls, VPN, anti-spam, content filtering — and load balancing. Together, they enable constant and consistent network protection against DDoS attacks.
- Make sure systems are up to date. Regularly patching infrastructure and installing new software versions closes more doors to attackers.
- Leverage the cloud. Cloud-based apps can curb harmful or malicious traffic before it ever reaches its intended destination. Such services are operated by software engineers whose job is to monitor the web for the latest DDoS tactics and attack vectors.
Avoid public or unsecured Wi-Fi. If remote workers must log in to an account on an untrusted network, use a VPN to encrypt all communications. Even bank websites can be forged to be almost undetectable. So, if an attacker has administrative access to the network, a data breach may occur.