Distributed Denial of Service (DDoS) Attacks
TLP WHITE: March 19, 2021
As information systems become more sophisticated, so do the methods used by the attackers. Criminal and nation state actors have long recognized the value of denial-of-service attacks which can cause serious business interruptions for any organization connected to the internet. Denial-of-Service attacks have increased in magnitude as more devices come online and organizations increase remote access for their staff.
This paper covers the motivations behind DDoS attacks, provides several historical examples and details several strategic and tactical recommendations IT and information security professionals can implement in their organizations to limit impacts from these disruptive attacks.
Key topics from the report include:
- – Impacts to the Threat Landscape
- – Observed Activity
- – Takedown Campaigns
- – Risk and Impact
- – Mitigation Strategies
Pdf version of report:
References:
Mar 19, 2021
Sources
SANS Institute: Information Security Reading Room – Preparing to Withstand a DDoS Attack
Security Magazine: How DDoS Activity Has Evolved this Year
InfoSecurity Magazine: DDoS Attacks Surge in 2020 Due to #COVID19
Acoustic Beat-Inspired DDoS Attack
Another Ransomware Now Using DDoS Attacks, Forcing Payment
MobileIron MDM System Targeting
Krebs on Security: Iranian Elections Bring Lull in Bank Attacks
Microsoft and Others Orchestrate Takedown of Trickbot Botnet
TrickBot Botnet Survives Takedown Attempt
NCBI Resources: Nursing Process
Security Magazine: Protecting VPNs from DDoS Attacks in the Age of Remote Work
The Business Journals: Are Remote Workers Protected Against Hackers?
Alert ID 6a16de1e
TLP:WHITE Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.
- Related Resources & News
- Healthcare Heartbeat 2024 Q4
- Health-ISAC Hacking Healthcare 2-19-2025
- Podcast: Reflecting on the Change Healthcare cyberattack
- Senate Confirms Trump Pick RFK Jr. to Lead HHS
- The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
- Health-ISAC 2025 Health Sector Cyber Threat Landscape
- How Health Systems Manage Security in the Cloud
- Change Healthcare Attack a Wake-up Call for the Industry
- Five High-Impact Cyberattacks Healthcare Industry Should Avoid in 2025
- Health-ISAC Hacking Healthcare 2-11-2025