ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

Q1 DDoS and application attack activity reveals surprise result

By Contributor
Thu 16 Jun 2022

Article by Radware director of threat intelligence, Pascal Geenens.

The cybersecurity threat landscape in the first quarter of 2022 represented a mixed bag of old enemies and new foes. New actors dominated the DDoS threat landscape while application security faced tried-and-true attack vectors.

These attacks were largely driven by a threat landscape turbocharged by geopolitical instability, hacktivists, nation-state threat actors, and a focus on exploiting newly discovered vulnerabilities.

A detailed analysis of real-world network and application attack activity from the first quarter of 2022 revealed some surprising results.

DDoS attack trends

In DDoS, micro floods increased by 125% in the first quarter of 2022 versus the fourth quarter of 2021. Micro floods are low throughput attack vectors with throughputs below 1Gbps but above 10Mbps.

Typically they fly under the radar and cannot be detected using traditional algorithms or techniques that spot larger throughput attack vectors based solely on thresholds.

By combining a large number of micro floods or adding micro floods to a mix of mid-sized and large attack vectors, attackers can significantly increase the complexity of their attack campaigns. Attackers can make mitigation harder by forcing mitigators to constantly adapt their policies.

Additionally, the number of blocked malicious events (per customer) rose nearly 75% compared to the first quarter of 2021. However, overall blocked volumes (in TBs) decreased dramatically.

The education and telecommunication sectors took the brunt of DDoS attacks, representing 67% of DDoS attack volume in the first three months of 2022, while the Americas represented over half of DDoS attack volumes during the same period.

Application attack trends

In terms of application attack activity, malicious bot activity increased dramatically. Bad bot transactions increased by 126% in the first quarter of 2022 versus the first quarter of 2021.

Cross-referencing application attack data against the OWASP Top 10 application security violations shows that Broken Access Control (A01 in OWASP 2021) represented over half of all blocked security violations during the first quarter of 2022.

High tech (31%) and the retail sector (27%) faced the majority of application attacks during the first quarter of 2022. Telecommunications/carriers finished in third place at 21%.

Lastly, predictable resource location, code injections and SQL injections were fan favourites of threat actors and represented the top three application violations, respectively, in the first quarter of 2022.

DDoS and application threat landscape analysis

The first quarter of 2022 was marked by geopolitical, hacktivist denial-of-service, and nation-state vulnerability-focused cyber activity.

Following the invasion of Ukraine and the escalation of hybrid warfare, my company monitored an increase in denial-of-service attacks targeting both the Russian and Ukrainian governments and associated financial institutions. The increase in denial-of-service activity was driven mostly by patriotic hacktivism from pro-Ukrainian and pro-Russian activists.

The IT Army of Ukraine brought hacking to the masses, including teens, via gamification of denial-of-service attacks. This included the playforukraine[.]info website, where in-game achievements are Russian websites you helped disrupt while playing.

WordPress websites were breached and injected with malicious code to perform denial-of-service attacks against Ukrainian targets upon loading the webpage. Any visitor of the breached WordPress sites became a bot, performing application-level, denial-of-service attacks targeted at a list of websites curated by the authors of the malicious code.

In an act of protest against the invasion of Ukraine, the maintainer of a popular Node.js module called ‘node-ipc’, deliberately sabotaged his module. The module, providing local and remote inter-process communication (IPC), is leveraged by many neural network and machine-learning tools.

The developer altered his code to deliberately corrupt files on systems running applications that depend on the node-ipc module, but only if the systems were geolocated in either Russia or Belarus.

The decentralised finance (DeFi) sector became a prime target for attacks. Crypto exchanges faced denial-of-service attacks following their ban of Russian citizens. Crypto exchanges were also the target of financially motivated attacks by North Korean state-sponsored threat actors.

A new vulnerability was discovered in the Java Spring framework, a popular framework for building online applications. Following its public disclosure at the end of March, after a Chinese researcher published a proof-of-concept on Github, Spring4shell was quickly exploited and required businesses to quickly patch applications leveraging the Java Spring framework.

OpIsrael, a yearly operation targeting Israelian businesses and citizens, was nearly non-existent this year due to Anonymous’ focus on the Russian/Ukrainian conflict.

OpsBedil, a hacktivist operation targeting Middle Eastern organisations in 2021, returned this year. OpsBedil is considered the replacement for the now-defunct OpIsrael operations. The new OpsBedil operations were conducted by DragonForce Malaysia and its affiliates throughout Southeast Asia, specifically Malaysia and Indonesia.

The current operation, OpsBedilReloaded, is considered a political response to events that occurred in Israel on April 11, 2022. During OpsBedilReloaded, hacktivists executed website defacements, sensitive data leaks and denial-of-service attacks. Based on previous OpsBedil TTPs, attack campaigns can be expected to run through April, May and potentially into the June/July timeframe.

Hacktivist campaigns like OpsBedil, while nowhere close to as notorious as OpIsrael once was, present a renewed level of risk for the region. Unlike Anonymous, DragonForce Malaysia and its affiliates have the time, the resources and the motivation to execute these attacks and present a moderate-level threat to Israel.

Related stories
Top stories
Story image
Microsoft
TO THE NEW unveils A/NZ Managed Services for Microsoft Azure
TO THE NEW has released Managed Services for Microsoft Azure to meet the growing demand in the A/NZ market and globally.
Story image
Sustainability
Honeywell launches new carbon energy management software for buildings
The new Carbon & Energy Management service allows building owners to track and optimise energy performance against carbon reduction goals, down to a device or asset level.
Story image
Infrastructure
Global investment in data centers more than doubled in 2021
DLA Piper's latest global survey finds the total investment in data center infrastructure worldwide rose from USD $24.4 billion in 2020 to USD $53.8 billion in 2021.
Story image
Tech job moves
Tech job moves - ActiveCampaign, Arcserve, LogRhythm & Qlik
We round up all job appointments from June 17-22, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Attack
Phishing attacks are making a comeback
No matter what approach or tool cybercriminals use to breach a network, they all have one thing in common: access.
Story image
Review
Hands-on review: Philips Hue White and Color Ambiance Starter Kit A60
Philips’ range of Hue smart lighting promises to make any home a smart home. Techday’s Darren Price checks out the Philips Hue White and Color Ambiance Starter Kit A60.
Story image
NaaS
Survey finds 94% of Australian IT leaders looking at NaaS
Aruba’s latest survey reveals a rising interest in NaaS among Australian technology leaders as they re-evaluate their current infrastructure and network setup.
Story image
B2B
Corpay partners with supply chain platform PracBiz Exchange
Corpay's new partnership with PracBiz’s allows more than 4000 B2B suppliers on the latter's platform to use Corpay's global payments services.
Story image
3D Printing
Fleet Space, Konica Minolta partner for 3D printer offering
Fleet Space has partnered with Konica Minolta to implement 3D printers from 3D Systems to support the commercial small satellite manufacturer’s offerings.
Wiise
Project accounting not adding up? Successful job-based businesses all have one thing in common, it's the way they manage their job and project accounting. Discover the 4 success factors now.
Link image
Story image
Apple
Jamf updates healthcare IT to protect data on Apple devices
Jamf has rolled out new functionality to help healthcare and IT teams protect patient data and streamline clinical access for their Apple fleet.
Wiise
Is your on-premise ERP holding you back? Many Australian businesses are moving from on-premise to the cloud so they can streamline processes and access up-to-date business data on the go. Here’s 5 signs that you’re equipped to migrate from on-premise to the cloud.
Link image
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Rimini Street
Today we welcome back Daniel Benad, who is the GVP & regional GM for Oceania at Rimini Street.
Story image
Cybersecurity
Ingram Micro launches vendor-backed security program
Ingram Micro has unveiled a new program intended to give resellers the effective offerings their customers need to stay safe in the evolving threat landscape.
Story image
Yubico
New research shows global drive for passwordless authentication
A new study has shown there has been a significant shift towards wanting a passwordless future, but adoption is still in its infancy.
Story image
Amazon Web Services / AWS
Zscaler, AWS accelerate onramp to the cloud with zero trust
Zscaler has announced an extension to its relationship with Amazon Web Services, as well as innovations built on Zscaler's Zero Trust architecture.
Story image
INTERPOL
Hundreds arrested, millions seized in global INTERPOL investigation
A two-month-long investigation by INTERPOL this year involved 76 countries and clamped down on organised crime groups behind telecommunications and social engineering scams.
Story image
Citrix
The best ways to attract young talent during labour shortages
New research from Citrix reveals hybrid working and ventures into the metaverse are top of mind for Gen Z workers.
Story image
Digital Transformation
Apptio adds portfolio enhancements to promote digital strategy
"While digitalisation creates opportunities, it also makes budgeting far more complex, leading many companies to waste substantial funds."
Story image
inDriver
New ride service inDriver arrives in Melbourne - pick your own fares
inDriver has launched in Melbourne, Australia and says it's set to disrupt the ride-hailing industry by allowing passengers and drivers to set and pick their own fares.
Story image
Hybrid workforce
Why hybrid working is here to stay and how to ace it
Citrix's new report reveals hybrid workers are more productive and engaged at work than their office and completely remote counterparts.
Story image
Cloud
Cloudflare outage in 19 data centers worldwide due to own error
Cloudflare says its outage for 19 of its data centers yesterday was because of a change in a long-running project to increase resilience in its busiest locations.
Story image
Internet of Things
Domino's Pizza: A blueprint for secure enterprise IoT deployment
Increasingly, organisations are embracing smart technologies to underpin innovations that can enhance safety and productivity in every part of our lives, from industrial systems, utilities, and building management to various forms of business enablement.
Story image
Cloud
Cloudera harnesses the power of cloud and data management for digital transformation
The data management landscape has changed significantly in recent years, with customer demands shifting and evolving in light of new technology and work processes.
Story image
Consumer
Adobe survey reveals link between brand trust and consumer buy-in
Adobe has announced results from a study, which finds a strong correlation between brand trust and consumer behaviour.
Story image
Gaming
Intel Arc A380 graphics units launched in China, global release imminent
New Intel Arc A380 graphics units are set to bring next-generation technologies to gamers and content creators in the coming months. 
Story image
Network Security
Netskope announces zero trust network access updates
Customers can now apply zero trust principles across a range of hybrid work security needs, including SaaS, IaaS, private applications, and endpoint devices.
Story image
DDoS
Flashpoint unveils security offering for school boards
Flashpoint has released its K-12 risk management and security offering to provide school boards and education security practitioners with tools to recognise, prevent and manage cyber and physical threats.
Story image
Cloud
NetApp announces winners of APAC Partner Excellence Awards
These awards recognise partners that have demonstrated success in delivering new cloud experiences, unlocking greater business value for their customers.
Story image
Cybersecurity
Aqua Security, CIS create software supply chain security guide
Aqua Securityand the Center for Internet Security have together released the industry’s first formal guidelines for software supply chain security.
Story image
Healthcare
Helping Western Sydney Local Health District provide a new model of care in the fight against COVID
Western Sydney Local Health District (WSLHD) and PwC’s Consulting Business came together to solve through the challenges of COVID-19.
Story image
trust
Consumers want personalisation, but don't trust brands with their data
Customers expect personalisation during every brand interaction but they don't trust brands to keep their personal data secure and to use it responsibly. 
Story image
Talend
Forrester names Talend Leader in enterprise data fabric
Forrester has named Talend a leader among enterprise data fabric providers in the Forrester Wave: Enterprise Data Fabric, Q2 2022 report.
Story image
Artificial Intelligence
Abnormal Security finds financial supply chain under threat
New research by Abnormal Security has found a rising trend in financial supply chain compromise as threat actors increasingly impersonate vendors.
Story image
Digital Transformation
Cybersecurity priorities for digital leaders navigating digital transformation
In recent years, Asia-Pacific has especially been a hotspot for cyberattacks, and as we continue into 2022, it’s evident that the problem is becoming more significant.
Wiise
What are the 5 critical impacts of outdated systems? As the landscape continues to shift, having the right ERP will make or break Australian businesses. Discover 5 ways your current ERP might be letting you down.
Link image
Wiise
3 success factors for your distribution business in FY23. With growing challenges facing Australia’s supply chain, understanding your key priorities as a wholesale distribution business is crucial. Discover the 3 success factors for your distribution business in FY23.
Link image
Story image
Ransomware
Rapid7 report examines use of double extortion ransomware attacks
New insight into how attackers think when carrying out cyber attacks, along with further analysis of the disclosure layer of double extortion ransomware attacks, has come to light.
Story image
CRM
Microsoft launches app for modern selling experience
The new release is designed to enhance CRM systems with customer engagement data from Microsoft 365 and Microsoft Teams.
Story image
Mitel
Martello and Mitel renew and extend their partnership
Martello has entered into an Amended Agreement with key partner Mitel, laying out the commercial terms under which it provides the Mitel Performance Analytics (MPA) software for sale to Mitel customers and partners.
Story image
Cybersecurity
Australia worst in the world for mobile app threats
Australia is the country with the highest percentage of mobile app threats detected, according to new research.
Story image
Manhattan Associates
New late-stage order cancellation to improve customer service
Manhattan Associates launches new service allowing orders to be cancelled up to the point of manifested/loaded status, preventing unwanted shipments and costly returns.
Story image
Partnerships
Microsoft expands APAC Enabler Mentorship Program
"Mentors are the key to success for every professional. A good mentor is a coach, a guide, as well as a vocal advocate."
Story image
Identity and Access Management
Ping Identity launches corporate venture capital fund
Ping Identity has launched a corporate venture capital fund to foster innovative offerings for the identity security market.