Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Issues Warning About the Rise in DDoS Attacks

b2ap3_thumbnail_fbi_warns_ddos_400.jpgDo you know anyone affected by recent ransomware activity? The tragedy of Cryptolocker/Cryptowall, where files are locked down and returned in exchange for a ransom fee, might still be fresh in your minds. Well, the FBI warns that the end of cyber extortion is still far off, and that the next hacking technique that will be used is likely the DDoS attack.

Distributed Denial of Service (DDoS) is generally characterized as an attack that rapidly targets a server with enough traffic to bring it down, effectively terminating site visitors and employees from accessing important information. This has been an effective way for hackers to mildly irritate consumers in the past, but this method is growing more common as a means to extort money from users; much in the same way that ransomware is used to leech money in return for access to your files. As explained by the Internet Crime Complaint Center, “the victim business receives an email threatening a distributed denial-of-service (DDoS) attack to its website unless it pays a ransom."

To avoid being tracked back to the hackers, the ransom is often required to be bitcoin. Attacks like this “ransomware” are growing more common, as they are proving to be lucrative sources of income for hackers who know what they’re doing. In fact, DDoS attacks can even be performed by an amateur user under the right circumstances. As explained in the official public service announcement from the FBI:

Businesses that experienced a DDoS attack reported the attacks consisted primarily of Simple Discovery Protocol (SSDP) and Network Time Protocol (NTP) reflection/amplification attacks, with an occasional SYN-flood and, more recently, Wordpress XML-RPC reflection/amplification attack. The attacks typically lasted one to two hours, with 30 to 35 gigabytes as the physical limit.

DDoS attacks are difficult to dodge completely. Since the server is being targeted by huge amounts of traffic or bandwidth, this can make protecting against them difficult at best. If you become the target of a DDoS attack, try to check where the traffic is primarily coming from. Your best bet is to block access to your server from the IPs constantly targeting it. This helps to prevent further attacks from the same source. It can also be worth completely blocking countries that are known for housing hackers.

If your organization is concerned about DDoS attacks, you can trust Evolve IT to help you through this difficult time. We can help your organization optimize security so that you have little to fear from attacks. And remember; never give in to the demands of hackers. They’re basically bullies with a fancy moniker. Give us a call at (518) 203-2110 for tech support that will never abandon you.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Hosted Solutions Computer Microsoft Upgrade Efficiency Workplace Tips Google Windows 10 IT Support Mobile Devices Innovation Smartphone Network Security Ransomware Hardware Gmail Facebook Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Operating System Communication Hacking WiFi The Internet of Things Social Media Phishing Alert App Networking Data storage Mobile Computing Big Data Data communications Windows Safety Experience Unified Threat Management Quick Tips Money Mobile Device Management Network Smartphones Firewall Content Filtering Managed Service Provider Cybercrime Outlook Website Wireless Technology Android Apple Employer-Employee Relationship Two-factor Authentication History Best Practice Small Business Office 365 Network Congestion Save Money Analytics Music Saving Money Monitors Lithium-ion battery intranet Laptop Cryptocurrency IBM Displays Google Docs Education Social Networking Holiday Public Speaking Cleaning IP Address Black Market Virtualization YouTube Processors End of Support Office Tips LiFi Staffing Government Downtime BYOD Augmented Reality Passwords Keyboard Streaming Media Help Desk Writing Search Micrsooft User Visible Light Communication Disaster Hard Drives Remote Computing Business Growth Shortcut Data Management DDoS Robot Advertising Recovery Word Sports Heating/Cooling Society Google Wallet Spam Retail Information Technology Running Cable Windows 8 Business Management Internet of Things Hosted Solution Windows XP IT Services Managed IT services Documents Competition Artificial Intelligence Presentation Tech Support Entrepreneur Compliance Domains Drones Bluetooth Social Hacker Printer Browser Automation Virtual Desktop Wireless Memory Securty Application Unified Communications Customer Service Document Management Encryption Deep Learning Law Enforcement SaaS VoIP BDR Proactive IT Router Cortana Vendor Management
QR-Code