IoT manufacturers' negligence in addressing known security vulnerabilities has led to a surge in DDoS attacks, with NetScout reporting around 880 confirmed incidents daily. March alone saw over 27,000 botnet-driven attacks, many from poorly secured devices optimized for low cost. Notably, the group NoName057(16) claimed over 475 attacks, employing diverse tactics and sustaining command-and-control operations. The average attack duration was slightly above the norm, suggesting a trend toward persistent, smaller-scale targeting. Mongolian IoT devices were significant sources of these attacks, primarily customized for local environments.
IoT manufacturers are failing to help prevent DDoS attacks by fixing known vulnerabilities, allowing criminals to launch years-long campaigns.
NoName057(16) was behind more than 475 claimed attacks in March, more than three times as many as the next most active group.
We observed more than 26,000 attack configurations linked to the group's infrastructure, representing variations in vector combinations, targets, and timing.
The average DDoS attack lasted about 18 minutes and 24 seconds, indicating a trend towards smaller, more persistent targeting.
Collection
[
|
...
]