Attacks on gaming services
caused by the actions Lizard Squad, while attacks on providers can be more
serious.
NSFOCUS company issued a
report on DDoS-attacks in the first half of 2014. It states that, as their new
targets, cybercriminals have chosen ISPs and game servers.
According NSFOCUS, rush
attacks on banks took place in the first half of 2013. Then 45% of DDoS-attacks
were carried out on sites and online-servises of institutions. On the second place were the corporate
networks of large companies - they became targets of 25% of all advanced
attacks.
In the second half of 2013 the number of attacks on
banks were reduced from 45% to 10%. At the same time attracted the attention of
criminals ISPs and services online-games. Already in the first half of 2014 10%
of all attacks came from providers, a further 15% - for gaming services.
The company has not explained the reasons for
switching attention of cybercriminals. Nevertheless, it is assumed that the
attacks on banks in 2013 were made on a number of political and financial reasons.
It is worth noting Activity Arab hackers, since 2012 leading cyber war against
the United States. In addition, a number of cybercrime gangs use DDoS-attacks
as a distraction to quietly transfer money from hacked bank accounts in their
wallets.
Increasing the number of cyber attacks on gaming
services this year due to the actions of hackers which are trying to undermine
the industry of computer entertainment. For example, Lizard Group during the
last month made a DDoS-attacks on the servers of Destiny, Call of Duty:
Ghosts, Battle.net and the Sony PlayStation Network.
Providers can be attacked in order to identify
vulnerabilities in their security system. Most likely, the hackers are prepared
to penetrate into their internal network to mass infect users.
NSFOCUS also reported that the duration of attacks
this year remains the same - 93.5% last less than 30 minutes. Note that in the first half of this year was
held on the record the attack on one of the web-sites, which lasted 228 hours.
Source: securitylab.ru
Source: securitylab.ru

No comments:
Post a Comment