Distributed denial-of-service attack rates have reached their peak during the first three months of 2022, with the number of DDoS attacks in the first quarter of this year being 4.5 times higher than the same period last year, TechRepublic reports.
Most of the increase in DDoS attack prevalence has been attributed to cybercrime groups' exploitation of the ongoing conflict between Russia and Ukraine, with some attacks coming from the U.S., North Korea, and China, according to Kaspersky researchers. Attacks during the first quarter peaked at 2,250 on Jan. 19 before declining by the end of February.
The U.S. accounted for 55.53% of all command-and-control servers used in DDoS attacks, while 44.34% of attacks were aimed at U.S.-based targets. Nearly 54% of attacks were discovered to be UDP flood, and while most attacks occurred within less than four hours, researchers found that the longest spanned nearly 23 days.
Kaspersky also noted that most attacks lasting more than a day were targeted at government and financial entities.
This week in the Security News: When you just wanna hurl, malicious containers, FCC bans stuff, these are not the CVE's you're looking for, Linux password mining, mind the gap, hacking smart watches, & more!
Threat actors were able to steal at least $15 million in cryptocurrency from separate but connected attacks against Web3 infrastructure provider Ankr and cryptocurrency platform Helio, reports The Record, a news site by cybersecurity firm Recorded Future.
Jscrambler researchers say while this latest reported Magecart attack dates back to December 2021, the attackers launched the attack by taking over a defunct internet domain that was decommissioned in December 2014.