SlideShare a Scribd company logo
1 of 7
Download to read offline
1
© MazeBolt Technologies. All Rights Reserved.
2
© MazeBolt Technologies. All Rights Reserved.
Table of Contents
Banking 3
Overview 3
DDoS Attacks on Banks 3
Government 4
Overview 4
DDoS Attacks on Governments 4
Retail 5
Overview 5
DDoS Attacks on Retail 5
Telcos 6
Overview 6
DDoS Attacks on Telcos 6
Introducing RADAR™ 7
About MazeBolt 7
3
© MazeBolt Technologies. All Rights Reserved.
Banking
Overview
The banking sector has always been a target for application and network layer DDoS attacks and one
single attack is all that is required to decrease customer confidence levels. The financial losses are
significant and a recent survey by Neustar states that over 80% of companies suffer an estimated loss
of $10,000 per hour during a DDoS-related outage. DDoS attacks on banks can cripple online banking
services by preventing customers from accessing the site. DDoS attacks can also be used to distract
the network team even as other forms of cyber-attacks are executed on internal applications. These
kinds of attacks will result in loss of data which is the ethos or the core of banking services. Even one
such attack, even without data loss, will result in damage to reputation and customer confidence. For
example, during Operation Power Off, several banks reported that during a DDoS attack, the public
impact was far greater than financial damage.
Banks most often entrust their security in the hands of DDoS mitigation companies. The challenge is
that mitigation solutions do not constantly re-configure and fine-tune their DDoS mitigation policies.
There is very limited ongoing visibility of DDoS risks and most importantly they do not detect DDoS
attacks before they are launched (reactive only) as mentioned in the European case study.
Some banks opt for DDoS testing. The key issues
with this are that it tests only human and
procedural response handling, not actual DDoS
vulnerability coverage. Also, it simulates only a
small variety of real DDoS attack vectors. It is a
static test run on dynamic systems (on average
runs twice a year) which makes the information
gathered relevant only to that point in time. To top
it off its disruptive to IT systems.
For banks to have the ultimate DDoS protection,
they need to continuously close all major DDoS
vulnerabilities. Based on 420 DDoS tests
conducted by MazeBolt on enterprises for the first
time between 2015 to the end of 2017,
configurations leave an inline vulnerability of >48%,
empowering DDoS attack vectors to penetrate the
best of DDoS mitigation solutions.
DDoS Attacks on Banks
Attackers often launch ransom-related DDoS attacks on banks. In 2020, attackers threatened
Australian banks with DDoS attacks if they will not pay large sums in cryptocurrency.
Attackers also often use DDoS attacks to distract the network security team, as they sneak in attacks
on applications to steal customer data.
A huge DDoS attack of over 800 million packets every second hit a large European bank. The important
point to be noted is how the attack escalated from nearly 400 GB to over 800 GB in less than 120
seconds. The point to be noted is the information shared by the mitigation solution provider after the
attack. They said that they were caught by surprise by the unusual aspect of the attack that involved a
totally new botnet army.
CASE STUDY - PAYONEER
Payoneer is a financial services company that offers
online money transfer and digital payment services.
More than 4 million customers trust Payoneer to
receive and manage their international payments.
Challenge: Payoneer’s network changes continuously,
providing global network access to third parties, adding
new mail servers etc. Payoneer did not have the tools
to configure DDoS mitigation for the vulnerabilities that
may be open due to network changes and result in
sneakier DDoS attacks.
Payoneer now uses MazeBolt’s RADAR™.
Read case study
“MazeBolt Technologies provides us with real-time
views of our DDoS Vulnerabilities, allowing us to
mitigate them in a timely manner which was not
previously possible.”
Yaron Weiss, VP Corporate Security and Global IT
Operations (CISO)
4
© MazeBolt Technologies. All Rights Reserved.
Government
Overview
Entire countries across the world are going through digital disruption as they digitalize their services to
better serve their citizens even as they reduce costs. This largescale transformation comes with its
own challenges and governments worldwide find themselves constantly targeted by DDoS attackers.
When governmental organizations are impacted by
DDoS attacks, the effects are far-reaching, and the
damages can be significant. For example, in
October 2020, a DDoS attack made the
headlines when it prevented the Robert Koch
Institute (RKI), Germany’s national institute for
disease control, from publishing its latest numbers
on coronavirus cases. This delay in responding to
the pandemic COVID-19 impaired the
government’s effort to contain the spread of the
virus. These attacks continue to happen and
continue to catch targets by surprise by their
suddenness and intensity.
Mitigation measures often fail in the face of DDoS
attacks as seen in the above examples. This is
because DDoS attacks are increasingly more
complex and quicker. They leave much less time
for current DDoS mitigation systems to react. Many
DDoS attacks manage to penetrate the best
mitigation solutions. To address these challenges,
there is a need to detect and close all DDoS
vulnerabilities ongoing before an attack is
launched. Allowing mitigation solutions to respond
in the fastest possible way with minimal manual
intervention.
DDoS Attacks on Governments
Governments worldwide are either impacted or learning from those already affected by DDoS attacks.
Recently, the National Action Party or PAN – Mexico’s Political Opposition Party – was targeted by
DDoS attacks that took down its website for about 15 minutes. Every month, 20 to 40 million attacks
are launched against Taiwan’s government websites. Millions of Australians were unable to fill out
mandatory Census online data forms because the government website was slammed by a Distributed
Denial of service (DDoS) attack. Government servers were forced offline in Luxembourg when they
came under a DDoS attack.
Politically motivated attacks are aimed to cause the victim damage or register their displeasure with
some actions. Attacks often coincide with large-scale public happenings such as elections. Before and
during the US elections, political campaigns experienced an average of 4,949 cyber-threats per day, and
larger campaigns even more. Government election-related sites were seeing over 122,000 threats every
day.
CASE STUDY - GOVERNMENT
This government site hosts services and information
from the Prime Minister’s Office, the Ministry of
Tourism, Culture and Sport, Public Security, Transport
and Road Safety, Energy, Construction and Housing
and the Law Enforcement and Collection System
Authority and so forth.
Challenge: The customer wanted to ensure that its
existing infrastructure would not be compromised
during the 2019 parliamentary elections due to DDoS
attacks. It was critical that the infrastructure displayed
seamless performance, reliability, and security always
but even more so during peak traffic periods.
Solution: To ensure business continuity, peak
performance, and 24/7 availability, MazeBolt evaluated
the existing DDoS mitigation postures and suggested
the implementation of the DDoS RADAR™, a patented
technology that enables Continuous Feedback on top
of any DDoS Mitigation system. DDoS vulnerabilities
were eliminated and drastically reduced within 2
weeks.
Benefits: DDoS vulnerabilities were eliminated and
drastically reduced DDoS risk within 2 weeks. The
infrastructure performed at its maximum capacity and
ensured that there was no downtime
5
© MazeBolt Technologies. All Rights Reserved.
Attackers sometimes are motivated to fight for social and ideological beliefs. In January 2019,
Zimbabwean government-related websites were hit with a DDoS attack by the hacktivist group
Anonymous protesting internet censorship in the country.
There are also incidents of “state-sponsored” attacks. The 2020 Australian government attacks,
targeted Australian businesses and governments. The attacks were described as “state-sponsored”,
which means a foreign government was believed to be behind it.
Historical data indicates that for DDoS attackers, any large-scale event is an invitation to launch a DDoS
attack. In March 2020, the US Department of Health and Human Services was hit by a DDoS attack
during the COVID-19 coronavirus pandemic.
Along with political motives, attackers indulge in attacks for cyber extortion demanding ransom in the
form of Bitcoin. The attackers demand ransom threatening data exposure or long periods of
downtime.
Retail
Overview
As the retail industry continues to transform and
adapt to disruptive digital transformations, the
threat of DDoS grows. There have also been
several instances of ransom threats with DDoS
attacks on retailers. Finding customers who buy
online, keeping in mind the severe competition, and
then losing them to a DDoS attack is unimaginable.
Summarizing this rise in attacks, the Organized
Crime report has found DDoS to be a top-five threat
emerging from organized crime, for which
extortion was the most common motive with DDoS
attacks targeting retailers during the peak holiday
season.
DDoS Attacks on Retail
When Dyn was hit with DDoS, Etsy, Shopify, and
PayPal amongst others experienced lengthy
outages. The Shopify DDoS attack put several
stores out of business.
In 2019, security firms reported a 150 percent increase in DDoS attacks in the months between summer
and the end of the year.
CASE STUDY - RETAIL
20000 stores across 45 states in the USA, delivering
everyday low prices on essential products from
America’s most trusted brands.
Challenge: Despite having a leading DDoS protection
solution, website availability was being impacted by
DDoS attacks. These impacts were being discovered at
the worst possible time – when the system came under
a damaging DDoS attack. The impact was significant,
with downtime costing over US$100,000 per hour.
Solution: MazeBolt’s RADAR™ solution continuously
detected DDoS attacks that bypassed their mitigation
solution before the attacks were launched and not after
they impacted operations.
Benefits: The continuous visibility provided by RADAR™
highlighted just how critical it is to match network
changes (e.g., adding new IP ranges, upgrading
network equipment, launching new services, etc.) with
respective fine-tuning of DDoS protection policies.
6
© MazeBolt Technologies. All Rights Reserved.
Telcos
Overview
With an ever-growing customer-base and
technology disruptions, Telcos are encountering
constant pressure to deliver innovative services at
lower costs to retain their customers in a highly
competitive market. Along with facing challenges
related to network optimization and performance,
technologies such as SDN, 5G, and NFV, they are
now encountering the biggest challenge of all
times – Distributed Denial of Service attacks
(DDoS).
Telcos operate many of the services that are most
vulnerable to DDoS attacks such as NTP or DNS,
increasing vulnerability levels. Telcos sometimes
become the vectors through which large outages
are created. If a service provider is attacked and
the services allowing them to operate their network
are compromised, an entire region can be
compromised. Attacks on Telcos can cripple
customers’ services and temporarily bring them
down. For example, during the Dyn DDoS attack,
nearly 70 enterprises suffered outages.
DDoS Attacks on Telcos
September 2020 saw more than a dozen Telcos across Europe being hit by DDoS attacks that targeted
their DNS infrastructure. The attacks which went on for over 24 hours were mitigated but their effects
have caused wide-scale outages and connectivity challenges.
In 2020, T-Mobile’s US network went down, impacting Verizon, AT&T, and other carriers and social
media were abuzz with reports of a major DDoS attack. This was never proved, but the fact remains
that the consequences of the downtime impacted several service providers, enterprises, and end-users.
These attacks follow in the footsteps of the massive attack on Telstra, which caused the internet to go
down for Telstra’s customers as the domain name server (DNS) overwhelmed the company’s network
infrastructure.
In a separate incident in 2020, Iceland country’s main telecommunications and co-location hosting
services were also hit by a DDoS attack. The media reports that the attack led to a feeling of
'uncertainty', for the first time in history about telecom services in Iceland.
The disruptions caused by the surge in DDoS attacks have left many of the affected countries still
reeling under the effect. For example, SwissSign from Switzerland lost a key customer as email
provider ProtonMail moved over to the company Let’s Encrypt amid the disruption. In France,
when SFR and Bouygues Telecom were attacked, media reports claim that internet services were
affected with 1000s reporting breakdowns and unusual delays in connecting to websites throughout
France.
CASE STUDY - VAS for TELCOS
Published reports show that DDoS attacks are costing
enterprises between $50,000 to $2.5M per attack. In
2020, a large European carrier reported that when an
attack is active, up to 70% of their network traffic can
be DDoS. In 2020 alone wireless telecommunication
companies saw a 64% increase in DDoS attacks.
Telcos are looking for brand differentiators, new
revenue streams, and tiered security services. Telcos
are also continuously reinventing themselves by
enhancing the value they provide and by optimizing
customer experience. Telcos can now offer premium
DDoS security services to their customers, triggering
customer dependability and loyalty.
Why RADAR™
• DDoS attacks are penetrating top mitigation
solutions.
• DDoS attack surface risks are constantly changing.
• Provides automated DDoS protection that assesses
DDoS vulnerabilities 24/7 on live production
systems. Ensuring that installed mitigation systems
are up to date on all DDoS vulnerabilities.
• Cutting down the possibilities of harmful and
damaging DDoS attacks from 45% to under 2% on
an on-going basis.
• Minimizing the risk of downtime to on-line services
and websites.
7
© MazeBolt Technologies. All Rights Reserved.
Introducing RADAR™
RADAR™, MazeBolt’s new patented technology solution is the only 24/7 automatic DDoS attack
simulator on live environment with ZERO downtime/ disruption. It automatically detects, analyses, and
prioritizes the remediation of DDoS vulnerabilities in any mitigation system. Raising the efficiency of
your Mitigation solution, delivering the ultimate DDoS protection.
About MazeBolt
MazeBolt is an innovation leader in cybersecurity and part of the DDoS mitigation space. Offering full
DDoS risk detection and elimination and working with any mitigation system to provide end to end full
coverage. Supporting organizations in avoiding downtime and closing DDoS vulnerabilities before an
attack happens.

More Related Content

What's hot

Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Michael Bunn
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Atlantic Security Conference
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperMartin Ruubel
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 

What's hot (20)

Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Security
SecuritySecurity
Security
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Final report
Final reportFinal report
Final report
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014Gartner Magic Quadrant for Secure Email Gateways 2014
Gartner Magic Quadrant for Secure Email Gateways 2014
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime Whitepaper
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 

Similar to DDoS Protection For Top 4 Industries | MazeBolt Technologies

Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Qrator Labs
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
DDoS Cyber Attacks Against Global Markets | Prolexic
DDoS Cyber Attacks Against Global Markets | ProlexicDDoS Cyber Attacks Against Global Markets | Prolexic
DDoS Cyber Attacks Against Global Markets | ProlexicProlexic
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfKrishna N
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationR. Blake Martin
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Sharon Lee
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyMazeBolt Technologies
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2Mike Revell
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends reportIan Beckett
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosHaltdos
 

Similar to DDoS Protection For Top 4 Industries | MazeBolt Technologies (20)

Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
DDoS Cyber Attacks Against Global Markets | Prolexic
DDoS Cyber Attacks Against Global Markets | ProlexicDDoS Cyber Attacks Against Global Markets | Prolexic
DDoS Cyber Attacks Against Global Markets | Prolexic
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
20160316_tbk_bit_module7
20160316_tbk_bit_module720160316_tbk_bit_module7
20160316_tbk_bit_module7
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
2016 payment threats trends report
2016 payment threats trends report2016 payment threats trends report
2016 payment threats trends report
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 

More from MazeBolt Technologies

DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...MazeBolt Technologies
 
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBoltDDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBoltMazeBolt Technologies
 
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesCommon Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesMazeBolt Technologies
 
Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...
Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...
Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...MazeBolt Technologies
 
Automatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesAutomatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesMazeBolt Technologies
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltMazeBolt Technologies
 
Top 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoS
Top 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoSTop 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoS
Top 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoSMazeBolt Technologies
 
Why DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesWhy DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesMazeBolt Technologies
 

More from MazeBolt Technologies (8)

DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBoltDDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
 
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesCommon Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
 
Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...
Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...
Mitigating Modern DDoS Attacks | Evaluate DDoS Protection | MazeBolt Technolo...
 
Automatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesAutomatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt Technologies
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
 
Top 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoS
Top 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoSTop 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoS
Top 10 DDoS Attacks 2019 | MazeBolt Technologies | Infographics on DDoS
 
Why DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesWhy DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt Technologies
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

DDoS Protection For Top 4 Industries | MazeBolt Technologies

  • 1. 1 © MazeBolt Technologies. All Rights Reserved.
  • 2. 2 © MazeBolt Technologies. All Rights Reserved. Table of Contents Banking 3 Overview 3 DDoS Attacks on Banks 3 Government 4 Overview 4 DDoS Attacks on Governments 4 Retail 5 Overview 5 DDoS Attacks on Retail 5 Telcos 6 Overview 6 DDoS Attacks on Telcos 6 Introducing RADAR™ 7 About MazeBolt 7
  • 3. 3 © MazeBolt Technologies. All Rights Reserved. Banking Overview The banking sector has always been a target for application and network layer DDoS attacks and one single attack is all that is required to decrease customer confidence levels. The financial losses are significant and a recent survey by Neustar states that over 80% of companies suffer an estimated loss of $10,000 per hour during a DDoS-related outage. DDoS attacks on banks can cripple online banking services by preventing customers from accessing the site. DDoS attacks can also be used to distract the network team even as other forms of cyber-attacks are executed on internal applications. These kinds of attacks will result in loss of data which is the ethos or the core of banking services. Even one such attack, even without data loss, will result in damage to reputation and customer confidence. For example, during Operation Power Off, several banks reported that during a DDoS attack, the public impact was far greater than financial damage. Banks most often entrust their security in the hands of DDoS mitigation companies. The challenge is that mitigation solutions do not constantly re-configure and fine-tune their DDoS mitigation policies. There is very limited ongoing visibility of DDoS risks and most importantly they do not detect DDoS attacks before they are launched (reactive only) as mentioned in the European case study. Some banks opt for DDoS testing. The key issues with this are that it tests only human and procedural response handling, not actual DDoS vulnerability coverage. Also, it simulates only a small variety of real DDoS attack vectors. It is a static test run on dynamic systems (on average runs twice a year) which makes the information gathered relevant only to that point in time. To top it off its disruptive to IT systems. For banks to have the ultimate DDoS protection, they need to continuously close all major DDoS vulnerabilities. Based on 420 DDoS tests conducted by MazeBolt on enterprises for the first time between 2015 to the end of 2017, configurations leave an inline vulnerability of >48%, empowering DDoS attack vectors to penetrate the best of DDoS mitigation solutions. DDoS Attacks on Banks Attackers often launch ransom-related DDoS attacks on banks. In 2020, attackers threatened Australian banks with DDoS attacks if they will not pay large sums in cryptocurrency. Attackers also often use DDoS attacks to distract the network security team, as they sneak in attacks on applications to steal customer data. A huge DDoS attack of over 800 million packets every second hit a large European bank. The important point to be noted is how the attack escalated from nearly 400 GB to over 800 GB in less than 120 seconds. The point to be noted is the information shared by the mitigation solution provider after the attack. They said that they were caught by surprise by the unusual aspect of the attack that involved a totally new botnet army. CASE STUDY - PAYONEER Payoneer is a financial services company that offers online money transfer and digital payment services. More than 4 million customers trust Payoneer to receive and manage their international payments. Challenge: Payoneer’s network changes continuously, providing global network access to third parties, adding new mail servers etc. Payoneer did not have the tools to configure DDoS mitigation for the vulnerabilities that may be open due to network changes and result in sneakier DDoS attacks. Payoneer now uses MazeBolt’s RADAR™. Read case study “MazeBolt Technologies provides us with real-time views of our DDoS Vulnerabilities, allowing us to mitigate them in a timely manner which was not previously possible.” Yaron Weiss, VP Corporate Security and Global IT Operations (CISO)
  • 4. 4 © MazeBolt Technologies. All Rights Reserved. Government Overview Entire countries across the world are going through digital disruption as they digitalize their services to better serve their citizens even as they reduce costs. This largescale transformation comes with its own challenges and governments worldwide find themselves constantly targeted by DDoS attackers. When governmental organizations are impacted by DDoS attacks, the effects are far-reaching, and the damages can be significant. For example, in October 2020, a DDoS attack made the headlines when it prevented the Robert Koch Institute (RKI), Germany’s national institute for disease control, from publishing its latest numbers on coronavirus cases. This delay in responding to the pandemic COVID-19 impaired the government’s effort to contain the spread of the virus. These attacks continue to happen and continue to catch targets by surprise by their suddenness and intensity. Mitigation measures often fail in the face of DDoS attacks as seen in the above examples. This is because DDoS attacks are increasingly more complex and quicker. They leave much less time for current DDoS mitigation systems to react. Many DDoS attacks manage to penetrate the best mitigation solutions. To address these challenges, there is a need to detect and close all DDoS vulnerabilities ongoing before an attack is launched. Allowing mitigation solutions to respond in the fastest possible way with minimal manual intervention. DDoS Attacks on Governments Governments worldwide are either impacted or learning from those already affected by DDoS attacks. Recently, the National Action Party or PAN – Mexico’s Political Opposition Party – was targeted by DDoS attacks that took down its website for about 15 minutes. Every month, 20 to 40 million attacks are launched against Taiwan’s government websites. Millions of Australians were unable to fill out mandatory Census online data forms because the government website was slammed by a Distributed Denial of service (DDoS) attack. Government servers were forced offline in Luxembourg when they came under a DDoS attack. Politically motivated attacks are aimed to cause the victim damage or register their displeasure with some actions. Attacks often coincide with large-scale public happenings such as elections. Before and during the US elections, political campaigns experienced an average of 4,949 cyber-threats per day, and larger campaigns even more. Government election-related sites were seeing over 122,000 threats every day. CASE STUDY - GOVERNMENT This government site hosts services and information from the Prime Minister’s Office, the Ministry of Tourism, Culture and Sport, Public Security, Transport and Road Safety, Energy, Construction and Housing and the Law Enforcement and Collection System Authority and so forth. Challenge: The customer wanted to ensure that its existing infrastructure would not be compromised during the 2019 parliamentary elections due to DDoS attacks. It was critical that the infrastructure displayed seamless performance, reliability, and security always but even more so during peak traffic periods. Solution: To ensure business continuity, peak performance, and 24/7 availability, MazeBolt evaluated the existing DDoS mitigation postures and suggested the implementation of the DDoS RADAR™, a patented technology that enables Continuous Feedback on top of any DDoS Mitigation system. DDoS vulnerabilities were eliminated and drastically reduced within 2 weeks. Benefits: DDoS vulnerabilities were eliminated and drastically reduced DDoS risk within 2 weeks. The infrastructure performed at its maximum capacity and ensured that there was no downtime
  • 5. 5 © MazeBolt Technologies. All Rights Reserved. Attackers sometimes are motivated to fight for social and ideological beliefs. In January 2019, Zimbabwean government-related websites were hit with a DDoS attack by the hacktivist group Anonymous protesting internet censorship in the country. There are also incidents of “state-sponsored” attacks. The 2020 Australian government attacks, targeted Australian businesses and governments. The attacks were described as “state-sponsored”, which means a foreign government was believed to be behind it. Historical data indicates that for DDoS attackers, any large-scale event is an invitation to launch a DDoS attack. In March 2020, the US Department of Health and Human Services was hit by a DDoS attack during the COVID-19 coronavirus pandemic. Along with political motives, attackers indulge in attacks for cyber extortion demanding ransom in the form of Bitcoin. The attackers demand ransom threatening data exposure or long periods of downtime. Retail Overview As the retail industry continues to transform and adapt to disruptive digital transformations, the threat of DDoS grows. There have also been several instances of ransom threats with DDoS attacks on retailers. Finding customers who buy online, keeping in mind the severe competition, and then losing them to a DDoS attack is unimaginable. Summarizing this rise in attacks, the Organized Crime report has found DDoS to be a top-five threat emerging from organized crime, for which extortion was the most common motive with DDoS attacks targeting retailers during the peak holiday season. DDoS Attacks on Retail When Dyn was hit with DDoS, Etsy, Shopify, and PayPal amongst others experienced lengthy outages. The Shopify DDoS attack put several stores out of business. In 2019, security firms reported a 150 percent increase in DDoS attacks in the months between summer and the end of the year. CASE STUDY - RETAIL 20000 stores across 45 states in the USA, delivering everyday low prices on essential products from America’s most trusted brands. Challenge: Despite having a leading DDoS protection solution, website availability was being impacted by DDoS attacks. These impacts were being discovered at the worst possible time – when the system came under a damaging DDoS attack. The impact was significant, with downtime costing over US$100,000 per hour. Solution: MazeBolt’s RADAR™ solution continuously detected DDoS attacks that bypassed their mitigation solution before the attacks were launched and not after they impacted operations. Benefits: The continuous visibility provided by RADAR™ highlighted just how critical it is to match network changes (e.g., adding new IP ranges, upgrading network equipment, launching new services, etc.) with respective fine-tuning of DDoS protection policies.
  • 6. 6 © MazeBolt Technologies. All Rights Reserved. Telcos Overview With an ever-growing customer-base and technology disruptions, Telcos are encountering constant pressure to deliver innovative services at lower costs to retain their customers in a highly competitive market. Along with facing challenges related to network optimization and performance, technologies such as SDN, 5G, and NFV, they are now encountering the biggest challenge of all times – Distributed Denial of Service attacks (DDoS). Telcos operate many of the services that are most vulnerable to DDoS attacks such as NTP or DNS, increasing vulnerability levels. Telcos sometimes become the vectors through which large outages are created. If a service provider is attacked and the services allowing them to operate their network are compromised, an entire region can be compromised. Attacks on Telcos can cripple customers’ services and temporarily bring them down. For example, during the Dyn DDoS attack, nearly 70 enterprises suffered outages. DDoS Attacks on Telcos September 2020 saw more than a dozen Telcos across Europe being hit by DDoS attacks that targeted their DNS infrastructure. The attacks which went on for over 24 hours were mitigated but their effects have caused wide-scale outages and connectivity challenges. In 2020, T-Mobile’s US network went down, impacting Verizon, AT&T, and other carriers and social media were abuzz with reports of a major DDoS attack. This was never proved, but the fact remains that the consequences of the downtime impacted several service providers, enterprises, and end-users. These attacks follow in the footsteps of the massive attack on Telstra, which caused the internet to go down for Telstra’s customers as the domain name server (DNS) overwhelmed the company’s network infrastructure. In a separate incident in 2020, Iceland country’s main telecommunications and co-location hosting services were also hit by a DDoS attack. The media reports that the attack led to a feeling of 'uncertainty', for the first time in history about telecom services in Iceland. The disruptions caused by the surge in DDoS attacks have left many of the affected countries still reeling under the effect. For example, SwissSign from Switzerland lost a key customer as email provider ProtonMail moved over to the company Let’s Encrypt amid the disruption. In France, when SFR and Bouygues Telecom were attacked, media reports claim that internet services were affected with 1000s reporting breakdowns and unusual delays in connecting to websites throughout France. CASE STUDY - VAS for TELCOS Published reports show that DDoS attacks are costing enterprises between $50,000 to $2.5M per attack. In 2020, a large European carrier reported that when an attack is active, up to 70% of their network traffic can be DDoS. In 2020 alone wireless telecommunication companies saw a 64% increase in DDoS attacks. Telcos are looking for brand differentiators, new revenue streams, and tiered security services. Telcos are also continuously reinventing themselves by enhancing the value they provide and by optimizing customer experience. Telcos can now offer premium DDoS security services to their customers, triggering customer dependability and loyalty. Why RADAR™ • DDoS attacks are penetrating top mitigation solutions. • DDoS attack surface risks are constantly changing. • Provides automated DDoS protection that assesses DDoS vulnerabilities 24/7 on live production systems. Ensuring that installed mitigation systems are up to date on all DDoS vulnerabilities. • Cutting down the possibilities of harmful and damaging DDoS attacks from 45% to under 2% on an on-going basis. • Minimizing the risk of downtime to on-line services and websites.
  • 7. 7 © MazeBolt Technologies. All Rights Reserved. Introducing RADAR™ RADAR™, MazeBolt’s new patented technology solution is the only 24/7 automatic DDoS attack simulator on live environment with ZERO downtime/ disruption. It automatically detects, analyses, and prioritizes the remediation of DDoS vulnerabilities in any mitigation system. Raising the efficiency of your Mitigation solution, delivering the ultimate DDoS protection. About MazeBolt MazeBolt is an innovation leader in cybersecurity and part of the DDoS mitigation space. Offering full DDoS risk detection and elimination and working with any mitigation system to provide end to end full coverage. Supporting organizations in avoiding downtime and closing DDoS vulnerabilities before an attack happens.