DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records

DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records
China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.

More than 4.7 million sources in five countries — the US, China, South Korea, Russia, and India — were used to level distributed denial-of-service (DDoS) attacks against victims in the second quarter of 2020, with the portmap protocol most frequently used as an amplification vector to create massive data floods, security and services firm A10 Networks says in its threat report for the second quarter. 


In its "State of DDoS Weapons" report for the second quarter of 2020, the company finds that China, Vietnam, and Taiwan accounted for more than a third of all DDoS botnet clients, while the most common high-volume floods used amplification attacks via portmap, the Simple Network Management Protocol (SNMP), and the Simple Service Discovery Protocol (SSDP). 


For the most part, while the infrastructure has become somewhat more sophisticated, the attacks have remained the same, says Rich Groves, director of research and development at A10 Networks. 


"DDoS attacks have been evolving to use more vectors for the past few years, and this is no exception moving forward," he says. "In many cases, if the attack type works — as many reflection, amplification, syn floods have for years — they will not stop."


The peak volume of the largest attacks continues to grow. In the first quarter of 2020, Amazon Web Services noted a 23% increase in the number of "volumetric events," such as data floods, including a reflection attack with a peak volume of 2.3 terabits per second, more than 70% higher bandwidth than the previously largest attack. 


The atta ..

Support the originator by clicking the read the rest link below.