dcsimg

What SMBs Can Learn from WikiLeaks DDoS Attacks

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Linked in  
Email  

You've heard the story about the WikiLeaks-inspired distributed denial of service (DDoS) attacks by now. Angered by the pulling of support from WikiLeaks by various payment merchants and network service providers, a collection of loosely affiliated hackers who call themselves Anonymous have made it their mission to DDoS the websites of the parties involved. Among others, DDoS attacks were launched against companies such as PayPal, Mastercard and Visa in a bid to exact vengeance by digitally crippling selected sites belonging to these organizations.

 

To achieve its objective, Anonymous modified an open source server load testing tool for its nefarious purpose, essentially creating an "opt-in" botnet where volunteers could download the software onto their machines to be coopted as part of a single botnet. The client connects to a centralized server to obtain instructions, before proceeding to pound away at specified targets using brute-force methods.

 

Called hacktivism by some and plain civil disobedience by others, it is obvious that the ramifications and legal aspects of the WikiLeak furor and the preceding DDoS attacks by Anonymous will remain a hotly debated topic for some time. The million-dollar question is: Should SMBs be worried by DDoS attacks?

 

First of all, let us take a look at some of the facts surrounding the rather public DDoS attacks. According to news sources, the size of the attacks spearheaded by Anonymous was believed to exceed 10Gbps at times, which is not an insignificant number. While I was not able to determine the number of clients that actually participated, experts have warned that the falling ratio of the bandwidth available to end users versus data center network speeds means that fewer clients can consume a larger amount of bandwidth when it comes to malicious traffic-sapping attacks.

 

With the strength of the average DDoS attacks increasing, there appear to be ample reasons for SMBs to be concerned that they could be singled out and hit badly one day. It must be remembered, though, that the various targeted sites weathered the DDoS attacks relatively well, proving that it is entirely possible to defend against these cyber incursions.

 

So should SMBs be concerned? My short answer is no, not if they have taken precautions to defend themselves or at least mitigate the repercussions. In my next blog, I will talk more about how SMBs can lay the groundwork to defend themselves against DDoS attacks.

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS