Thursday, June 20, 2024

A New Massive DDoS Attack bit-and-Piece Pattern Targeting Internet Service Providers

Internet service providers hit with a new stealthy volumetric attack by injecting the malicious traffic with the legitimate traffic to evade detection.

Attackers carry out an advanced reconnaissance method to covertly gathers information about mission-critical IP address and inject pieces of attack traffic with the legitimate traffic to evade detection.

Nexusguard called this stealthy attack as bit-and-piece which is different from the regular volumetric or pulse wave attack.


“Bit-and-piece exploits the large attack surfaces of ASN-level CSPs, whereas traditional attacks zero in on one or a few IPs that serve mission-critical services such as websites and mail servers and overwhelm the target by sending the voluminous amount of junk.”

According to Nexusguard report, around 527 class c networks were targeted in the campaign and the targeted networks are within the same geo-location. The amplification attacks are the dominant one in the third quarter and ISps are the prime target in the attack.

Following are the top three attack vectors SSDP(34.35%), UDP Attacks(29.02 %) and ICMP Attacks (10.34 %). The bit-and-piece particularly abuses UDP port to generate small-sized SSDP attacks and distribute them over a large number of IP address.

Like Mongol troops in the past, attackers conducted reconnaissance missions to map out the network landscape in advance and identify the mission-critical IP ranges of targeted CSPs.

The average size of an attack is 0.972Gbps and the average attack duration is 184.23 minutes. China ranks number one in the attack source distribution followed by U.S and Vietnam.

“The ongoing evolution of DDoS methods suggests that CSPs need to enhance their network security posture and find better ways to protect their critical infrastructure and their tenants.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Why Do Universities Sites Need DDOS Protection?

American Hacker Got 10 Years Prison for DDoS Attack on Hospitals

DDoS-For-Hire Services – 15 Websites Has Been Seized That Offering DDoS Services


Latest articles

1inch partners with Blockaid to enhance Web3 security through the 1inch Shield

1inch, a leading DeFi aggregator that provides advanced security solutions to users across the...

Hackers Exploit Progressive Web Apps to Steal Passwords

In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs)...

INE Security: Optimizing Teams for AI and Cybersecurity

2024 is rapidly shaping up to be a defining year in generative AI. While...

Threat Actor Claims Breach of Jollibee Fast-Food Gaint

A threat actor has claimed responsibility for breaching the systems of Jollibee Foods Corporation,...

Threat Actors Claiming Breach of Accenture Employee Data

Threat actors have claimed responsibility for a significant data breach involving Accenture, one of...

Diamorphine Rootkit Exploiting Linux Systems In The Wild

Threat actors exploit Linux systems because they are prevalent in organizations that host servers,...

Amtrak Data Breach: Hackers Accessed User’s Email Address

Amtrak notified its customers regarding a significant security breach involving its Amtrak Guest Rewards...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles