The expected evolution of DDoS attacks continues. Attack sizes increase over time, tools become easier to use, more threat actors are launching attacks, older attack techniques have become commoditized and new attack techniques are added to the mix on a regular basis. Attacks are cheap, easy, and extremely common. The criminal underground continues to provide services and continues to obtain funding for providing those services, which provides further incentive for additional attackers to join the game.
The end result is the frenetic, daily DDoS activity that is reflected in the Digital Attack Map, which is a collaboration between Google Ideas and Arbor. The Digital Attack Map is a visual representation of Arbor’s DDoS attack data, sourced from 330 service providers around the world as part of our ATLAS initiative.
The attack maps show the tangible evidence of what these DDoS tools enable.
For a technical deep dive into some of the most popular DDoS toolkits on the cybercrime underground market today, flip through the SlideShare presentation below and then click over to ASERT’s Curt Wilson’s blog post for a full analysis of each toolkit and technique.