{"id":517,"date":"2019-09-18T09:12:16","date_gmt":"2019-09-18T03:42:16","guid":{"rendered":"https:\/\/www.hostnamaste.com\/blog\/?post_type=news&#038;p=517"},"modified":"2024-10-18T11:42:59","modified_gmt":"2024-10-18T06:12:59","slug":"nexusguard-research-reveals-1000-increase-in-dns-amplification-attacks-since-last-year","status":"publish","type":"news","link":"https:\/\/www.hostnamaste.com\/blog\/news\/nexusguard-research-reveals-1000-increase-in-dns-amplification-attacks-since-last-year\/","title":{"rendered":"Nexusguard research reveals 1,000% increase in DNS amplification attacks since last year"},"content":{"rendered":"<p>&nbsp;<\/p>\n<figure id=\"attachment_518\" aria-describedby=\"caption-attachment-518\" style=\"width: 840px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-518\" src=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/09\/Nexusguard-research-reveals-1000-increase-in-DNS-amplification-attacks-since-last-year-HostNamaste.png\" alt=\"Nexusguard research reveals 1,000% increase in DNS amplification attacks since last year - HostNamaste\" width=\"840\" height=\"430\" srcset=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/09\/Nexusguard-research-reveals-1000-increase-in-DNS-amplification-attacks-since-last-year-HostNamaste.png 674w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/09\/Nexusguard-research-reveals-1000-increase-in-DNS-amplification-attacks-since-last-year-HostNamaste-300x154.png 300w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><figcaption id=\"caption-attachment-518\" class=\"wp-caption-text\"><\/span> <span style=\"font-size: 8pt;\"><strong><span style=\"font-family: Verdana, Geneva; color: #99cc00;\">Nexusguard research reveals 1,000% increase in DNS amplification attacks since last year &#8211; HostNamaste.com<\/span><\/strong><\/span><\/figcaption><\/figure>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\">DNS amplification attacks swelled in the second quarter of this year, with the amplified attacks spiking more than 1,000% compared with Q2 2018, according to Nexusguard\u2019s \u201cQ2 2019 Threat Report.\u201d<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\">Nexusguard researchers attributed Domain Name System Security Extensions (<a href=\"https:\/\/www.icann.org\/resources\/pages\/dnssec-what-is-it-why-important-2019-03-05-en\" target=\"_blank\" rel=\"noopener\">DNSSEC<\/a>) with fueling the new wave of DNS amplification attacks, which accounted for more than 65% of the attacks last quarter according to the team\u2019s evaluation of thousands of worldwide DDoS attacks. DNSSEC was designed to protect applications from using forged or manipulated DNS data, and its growing adoption suggests that DNS amplification risks won\u2019t disappear for service providers or enterprise networks anytime soon.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\">Nexusguard is a cloud-based DDoS (distributed denial of service) security solution provider.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\">According to the quarterly report, <strong>PayPal.com<\/strong> and <strong>multiple government domains<\/strong> fell victim to rampant DNS abuses, likely due to many of these domains deploying DNSSEC to the top-level .gov domain, as required by the US government\u2019s mandate from the Office of Management and Budget. When blocking DNS amplification attacks, it\u2019s not realistic to drop all DNS associated traffic, since users rely on DNS services to access the internet, and the tactic could deny service to paying customers. Nexusguard researchers warn that service providers must ensure their attack mitigation technology is advanced enough to ensure server availability to legitimate end-users, to ensure their access doesn\u2019t end up as collateral damage.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\">\u201cAlthough the adoption of DNSSEC is gaining wider acceptance as the patch for fixing DNS cache poisoning, it is now causing a new set of problems for organizations and service providers,\u201d said Juniman Kasman, chief technology officer for Nexusguard. \u201cDue to the long responses they generate, attackers often abuse DNSSEC to launch amplification attacks that clog victim networks and hosts, which will remain a significant threat in the future.\u201d<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: Verdana, Geneva;\">Nexusguard findings also confirm that \u201cbit and piece\u201d attacks continued to spread this quarter, adopted for attacks across Europe, North America, and Africa. Mobile devices also continued to contribute to DDoS attacks, which primarily originated from iOS mobile devices in addition to botnet-hijacked Windows machines. Nexusguard\u2019s quarterly DDoS threat research gathers attack data from botnet scanning, honeypots, CSPs and traffic moving between attackers and their targets to help companies identify vulnerabilities and stay informed about global <a href=\"https:\/\/www.hostnamaste.com\/blog\/how-to-stay-secure-from-cyber-attacks\/\">cybersecurity<\/a> trends.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; DNS amplification attacks swelled in the second quarter of this year, with the amplified attacks spiking more than 1,000% compared with Q2 2018, according&hellip;<\/p>\n","protected":false},"author":2,"featured_media":518,"comment_status":"open","ping_status":"closed","template":"","tags":[627,628,624,623,626,625],"news-category":[619,621,622,620],"class_list":["post-517","news","type-news","status-publish","has-post-thumbnail","hentry","tag-ddos","tag-ddos-attacks","tag-dns","tag-dns-amplification-attacks","tag-dnssec","tag-nexusguard","news-category-dns-amplification-attacks","news-category-ddos","news-category-ddos-attacks","news-category-dnssec"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/comments?post=517"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/517\/revisions"}],"predecessor-version":[{"id":6441,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/517\/revisions\/6441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media\/518"}],"wp:attachment":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media?parent=517"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/tags?post=517"},{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news-category?post=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}