SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
The Asian DDoS Attack Threat Is Huge and Growing
Selected excerpts
Prolexic recently released the Q4 2013 Global Attack Report, which explores the significant threat of
distributed denial of service (DDoS) attacks from China and other countries in Asia. This DDoS threat
increased throughout 2013 and is expected to continue growing.
Recent years have marked a significant rise in distributed denial of service (DDoS) activity from
Asia with targets within the region and around the world. Prolexic has observed malicious actors
compromising Chinese and other Asian IT resources and using them as command and control
(CnC, CC or C2) and zombies in DDoS botnets. In fact, in Q4 2013, six the top ten source countries
for DDoS activity were in Asia: China, Thailand, Korea, India, Saudi Arabia and Turkey – as shown
in Figure 1. Excepting the United States, China topped the list as the source country for 19 percent
of DDoS attacks observed by Prolexic in Q4 2013.
The Chinese government has promoted
Internet adoption as part of its
geopolitical and economic growth
strategy and has an aggressive
government policy of building new IT
infrastructure. As a result, China has
the largest infrastructure and Internet
population in Asia, with more than 538
million users.
Countries such as China, where
technological growth expands rapidly,
are often susceptible to a lack of
oversight, lax security, and a shortage of management for large server farms. This situation can
result in the presence of significant vulnerabilities that can be exploited by malicious actors.
Serious vulnerabilities arise from the sheer number of devices in China’s Internet-connected
infrastructure and the country’s tendency to run older, pirated and unpatched operating systems:
● China had an estimated 8.7 million domain names and 2.5 million websites in June 2012,
creating a huge source of opportunity for hackers.
● The dominant operating system is Windows XP, but Microsoft will stop supporting XP in
●
●
●
●
●
●
●

2014.
The software piracy rate in China is estimated at 80 percent.
Pirated software is rarely updated or patched, leaving it vulnerability viruses and malware.
China is estimated to have the highest rate of computer infections of any country.
DDoS botnets are often built from infected devices.
Prolexic has observed DDoS toolkits created for Chinese users.
Much of the country’s IT infrastructure is state-owned.
The Chinese state may itself launch DDoS attacks.

China also has a huge number of mobile users, more than 400 million. In fact, mobile Internet
usage in the country is now believed to have surpassed Internet access via desktop. There are
strong indications that these mobile devices also have a high infection rate. In 2012, there were an
estimated 162,000 mobile malware programs in China. Mobile devices participate in DDoS attacks,
and Prolexic anticipates an increasing role for mobile devices from China in DDoS campaigns in
the future.
The growing DDoS threat from China takes several forms: an increase in DDoS reflection attacks
using the CHARGEN protocol, the use of botnets built from Asian IT resources, DDoS attacks by
hacktivist groups, and the presence of Chinese DDoS attack kits. Learn more about each of these
threats in the Q4 2013 Global DDoS Attack Report from Prolexic.
Get the full Q4 2013 Global Attack Report with all the details
Each quarter Prolexic produces a quarterly DDoS attack report. As the world’s leading DDoS
mitigation provider, Prolexic is ideally positioned to collect valuable data on the origins, tactics,
types and targets of DDoS attacks and identify emerging trends. Download the Q4 2013 Global
DDoS Attack Report for:
● Details about DDoS threats from Asia
● Year-over-year and quarter-by-quarter global DDoS attack statistics
● Types of attacks and industries targeted in Q4 2013
● Network protocols at risk for abuse by attackers
● Details about real attacks mitigated by Prolexic
The more you know about DDoS attacks, the better you can protect your network against
cybercrime. Download the free Q4 2013 Global DDoS Attack Report today.
About Prolexic
Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and
mitigation services. Learn more at http://www.prolexic.com

Mais conteúdo relacionado

Destaque

Ramadan, the Month of Forgiveness
Ramadan, the Month of ForgivenessRamadan, the Month of Forgiveness
Ramadan, the Month of ForgivenessXenia Y
 
Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Ravi Kashyap
 
Social Media for NonProfits 2012
Social Media for NonProfits 2012Social Media for NonProfits 2012
Social Media for NonProfits 2012Eileen O'Brien
 
Use of Water by Electric Generating Facilities in Texas
Use of Water by Electric Generating Facilities in TexasUse of Water by Electric Generating Facilities in Texas
Use of Water by Electric Generating Facilities in Texasaectnet
 
CSS Methodology
CSS MethodologyCSS Methodology
CSS MethodologyZohar Arad
 

Destaque (6)

Ramadan, the Month of Forgiveness
Ramadan, the Month of ForgivenessRamadan, the Month of Forgiveness
Ramadan, the Month of Forgiveness
 
Pre fiat impacts
Pre fiat impactsPre fiat impacts
Pre fiat impacts
 
Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02
 
Social Media for NonProfits 2012
Social Media for NonProfits 2012Social Media for NonProfits 2012
Social Media for NonProfits 2012
 
Use of Water by Electric Generating Facilities in Texas
Use of Water by Electric Generating Facilities in TexasUse of Water by Electric Generating Facilities in Texas
Use of Water by Electric Generating Facilities in Texas
 
CSS Methodology
CSS MethodologyCSS Methodology
CSS Methodology
 

Último

MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhangmcgroupjeya
 
Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)
Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)
Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)tazeenaila12
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.mcshagufta46
 
Introduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptxIntroduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptxJemalSeid25
 
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...AustraliaChapterIIBA
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarNathanielSchmuck
 
Developing Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursDeveloping Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursKaiNexus
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessAPCO
 
Fabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and FestivalsFabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and FestivalsWristbands Ireland
 
MoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor PresentationMoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor Presentationbaron83
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBBPMedia1
 
Slicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup BerlinSlicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup BerlinAnton Skornyakov
 
Anyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyAnyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyHanna Klim
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.ukaroemirsr
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...IMARC Group
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examplesamberjiles31
 
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...Khaled Al Awadi
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsyasinnathani
 

Último (20)

MC Heights construction company in Jhang
MC Heights construction company in JhangMC Heights construction company in Jhang
MC Heights construction company in Jhang
 
Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)
Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)
Harvard Business Review.pptx | Navigating Labor Unrest (March-April 2024)
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.
 
Introduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptxIntroduction to The overview of GAAP LO 1-5.pptx
Introduction to The overview of GAAP LO 1-5.pptx
 
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
 
Live-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry WebinarLive-Streaming in the Music Industry Webinar
Live-Streaming in the Music Industry Webinar
 
Developing Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, OursDeveloping Coaching Skills: Mine, Yours, Ours
Developing Coaching Skills: Mine, Yours, Ours
 
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for BusinessQ2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
Q2 2024 APCO Geopolitical Radar - The Global Operating Environment for Business
 
Fabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and FestivalsFabric RFID Wristbands in Ireland for Events and Festivals
Fabric RFID Wristbands in Ireland for Events and Festivals
 
MoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor PresentationMoneyBridge Pitch Deck - Investor Presentation
MoneyBridge Pitch Deck - Investor Presentation
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
 
Slicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup BerlinSlicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup Berlin
 
Anyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agencyAnyhr.io | Presentation HR&Recruiting agency
Anyhr.io | Presentation HR&Recruiting agency
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.uk
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
 
Intellectual Property Licensing Examples
Intellectual Property Licensing ExamplesIntellectual Property Licensing Examples
Intellectual Property Licensing Examples
 
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...NewBase  25 March  2024  Energy News issue - 1710 by Khaled Al Awadi_compress...
NewBase 25 March 2024 Energy News issue - 1710 by Khaled Al Awadi_compress...
 
Investment Opportunity for Thailand's Automotive & EV Industries
Investment Opportunity for Thailand's Automotive & EV IndustriesInvestment Opportunity for Thailand's Automotive & EV Industries
Investment Opportunity for Thailand's Automotive & EV Industries
 
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
TalentView Webinar: Empowering the Modern Workforce_ Redefininig Success from...
 
Data skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story pointsData skills for Agile Teams- Killing story points
Data skills for Agile Teams- Killing story points
 

Prolexic DDoS Attack Report: The Growing DDoS Attack Threat from Asia

  • 1. The Asian DDoS Attack Threat Is Huge and Growing Selected excerpts Prolexic recently released the Q4 2013 Global Attack Report, which explores the significant threat of distributed denial of service (DDoS) attacks from China and other countries in Asia. This DDoS threat increased throughout 2013 and is expected to continue growing. Recent years have marked a significant rise in distributed denial of service (DDoS) activity from Asia with targets within the region and around the world. Prolexic has observed malicious actors compromising Chinese and other Asian IT resources and using them as command and control (CnC, CC or C2) and zombies in DDoS botnets. In fact, in Q4 2013, six the top ten source countries for DDoS activity were in Asia: China, Thailand, Korea, India, Saudi Arabia and Turkey – as shown in Figure 1. Excepting the United States, China topped the list as the source country for 19 percent of DDoS attacks observed by Prolexic in Q4 2013. The Chinese government has promoted Internet adoption as part of its geopolitical and economic growth strategy and has an aggressive government policy of building new IT infrastructure. As a result, China has the largest infrastructure and Internet population in Asia, with more than 538 million users. Countries such as China, where technological growth expands rapidly, are often susceptible to a lack of oversight, lax security, and a shortage of management for large server farms. This situation can result in the presence of significant vulnerabilities that can be exploited by malicious actors. Serious vulnerabilities arise from the sheer number of devices in China’s Internet-connected infrastructure and the country’s tendency to run older, pirated and unpatched operating systems: ● China had an estimated 8.7 million domain names and 2.5 million websites in June 2012, creating a huge source of opportunity for hackers. ● The dominant operating system is Windows XP, but Microsoft will stop supporting XP in
  • 2. ● ● ● ● ● ● ● 2014. The software piracy rate in China is estimated at 80 percent. Pirated software is rarely updated or patched, leaving it vulnerability viruses and malware. China is estimated to have the highest rate of computer infections of any country. DDoS botnets are often built from infected devices. Prolexic has observed DDoS toolkits created for Chinese users. Much of the country’s IT infrastructure is state-owned. The Chinese state may itself launch DDoS attacks. China also has a huge number of mobile users, more than 400 million. In fact, mobile Internet usage in the country is now believed to have surpassed Internet access via desktop. There are strong indications that these mobile devices also have a high infection rate. In 2012, there were an estimated 162,000 mobile malware programs in China. Mobile devices participate in DDoS attacks, and Prolexic anticipates an increasing role for mobile devices from China in DDoS campaigns in the future. The growing DDoS threat from China takes several forms: an increase in DDoS reflection attacks using the CHARGEN protocol, the use of botnets built from Asian IT resources, DDoS attacks by hacktivist groups, and the presence of Chinese DDoS attack kits. Learn more about each of these threats in the Q4 2013 Global DDoS Attack Report from Prolexic. Get the full Q4 2013 Global Attack Report with all the details Each quarter Prolexic produces a quarterly DDoS attack report. As the world’s leading DDoS mitigation provider, Prolexic is ideally positioned to collect valuable data on the origins, tactics, types and targets of DDoS attacks and identify emerging trends. Download the Q4 2013 Global DDoS Attack Report for: ● Details about DDoS threats from Asia ● Year-over-year and quarter-by-quarter global DDoS attack statistics ● Types of attacks and industries targeted in Q4 2013 ● Network protocols at risk for abuse by attackers ● Details about real attacks mitigated by Prolexic The more you know about DDoS attacks, the better you can protect your network against cybercrime. Download the free Q4 2013 Global DDoS Attack Report today. About Prolexic Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. Learn more at http://www.prolexic.com