The Four Main Types of Cyberattack That Affect Data Center Uptime

Here are the most common types of attack that bring down data centers.

Maria Korolov

June 4, 2019

3 Min Read
The Four Main Types of Cyberattack That Affect Data Center Uptime

DDoS

The most common type of attack that can take down a data center is distributed denial of service, or DDoS.

In fact, according to the most recent Verizon Data Breach Investigations report, DDoS attacks were the second most common attack vector in last year's security incidents, following privilege misuse. And, according to a report released in April by Neustar, the number of DDoS attacks 100 Gbps in size and larger increased by nearly 1,000 percent from the first quarter of 2018 to the first quarter of this year.

According to Adam Kujawa, director of Malwarebytes Labs at Malwarebytes Corp., a DDoS attack is a direct and immediate threat to data center uptime.

Plus, the proliferation of poorly secured connected devices such as routers and cameras creates a lot of opportunities for criminals to build botnets with which to launch these attacks.

"But technology has evolved so we have a better chance of protecting ourselves," he added.

Ransomware

As the latest Verizon report showed, ransomware continues to be a major threat.

Unlike DDoS attacks, which are over when they're over, the effects of ransomware can continue after the initial attack is stopped, said Dan Tuchler, CMO at SecurityFirst.

"If the data is corrupted or in an unknown state, it can take significant time to restore the data from backup," he said.  As a result, data centers might not be able to function for hours or even days after an attack.

Related:Here’s How ZombieLoad Affects Data Centers and What to Do About It

And there's a secondary hit, said Mounir Hahad, head of threat research at Juniper Networks. "Ransomware has an obvious impact on downtime as the IT staff would race to recover data from backups," he said. "But the detection of intrusion may result in downtime as well, as IT staff try to cut off any potential exfiltration activity."

It can take several days to do the forensics necessary to find out if the attackers were able to compromise any databases. "Services may be offline during that time," he said, "at least until the method of exfiltration is understood and remediation is in place."

These costs add up. In fact, according to Cybersecurity Ventures, the total global damages from ransomware are predicted to hit $11.5 billion in 2019, up from $8 billion last year.

External Access Services

When protecting against downtime, data center managers can often overlook some external services their computing sites depend on, such as cloud access security brokers or external DNS servers.

"Attackers target those dependent services to cause widespread harm," said Darien Kindlund, VP of technology at Insight Engines. "In many cases, firms that protect data centers may overlook these external dependencies when threat-modeling, as they may not even be aware that such dependencies exist during architecture reviews."

Related:What We Can Learn from the Ransomware Attack That Crippled Norsk Hydro

One of the biggest examples of this kind of attack was the 2016 cyberattack against DNS provider Dyn, which took down services around Europe and North America. Services affected included the Boston Globe, CNN, Comcast, GitHub, HBO, PayPal, and many others.

Application Attacks

Attacks against individual web or server applications require a lot less bandwidth but can still effectively shut down services, said Alex Heid, chief research officer at SecurityScorecard.

For example, if a data center or hosting provider has a control panel application for its customers or users, an attack against that application that causes it to crash would impact availability.

Similarly, protocols can also be overwhelmed by a single, focused attack, he said. "Examples of these attacks include Dropbear SSH DoS and the Slowloris Apache HTTP attack."

In fact, attackers are increasingly using lower-volume, more targeted attacks to take down their victims, according to the Neustar report.

These kinds of attacks will also morph over the course of an attack to make them harder to defend against. According to the company, in the first quarter of 2019, more than 77 percent of denial of service attacks used two or more vectors.

About the Author

Maria Korolov

Maria Korolov is an award-winning technology journalist who covers cybersecurity, AI, and extended reality. She also writes science fiction.

https://www.mariakorolov.com/

Subscribe to the Data Center Knowledge Newsletter
Get analysis and expert insight on the latest in data center business and technology delivered to your inbox daily.

You May Also Like