• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 28th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Events
Cyber Attacks

DDoS Ransom Notes, to Honor or Not to Honor?

July 13th, 2015 Waqas Cyber Attacks 0 comments
DDoS Ransom Notes, to Honor or Not to Honor?
Share on FacebookShare on Twitter

In the wake of cyber crimes, a DDoS (Distributed Denial of Service) attack is something to be on the look-out for.

Lately, these attacks have seen phenomenal growth not only with regard to the increasing number of cases but also to new twists of development they are gaining.

DDoS attacks, as the name suggests, bar legitimate users access to a server or network resource by disrupting services of a host linked to the Net.

[must url=”https://www.hackread.com/china-great-cannon-blocks-websites/”]‘Great Cannon’ of China Blocks Websites Like No One Else Can[/must]

ddos-ransome-notes-to-honor-or-not-to-honor

Why DDoS attacks?

There are many possible explanations to the increase of DDoS attacks. It is rather unfortunate that some victims of this crime are not aware of its existence in the first place. For some time now, DDoS attacks were connected with some crazy kiddies out there trying to have fun or earn easy cash, not so anymore. With the new development of ransom notes, this concept has taken a whole new turn.

This wave of extortion has gone on a much higher level with attackers not only sending threatening notes but also giving their victims a taste of the damage they can cause.

Aggressive completion in the business world could well be another ground for DDoS attacks. It is not uncommon for some unscrupulous companies to use this means to have competitive advantage or even launch an attack against their rivals.

Politics too has its stake in it. DDoS have also been brought about by philosophical and political rivalry. Elsewhere, groups associated with the hate crime have used DDoS attacks to get even with their enemies.

Reference may also be drawn from attackers craving for attention from targeted sites or even groups, or simply a test of their potential.

For some reason, money is a major motivating factor. Whether for the script kiddie, low-level cyber criminal or well-established gangs like the DD4BC. In fact, the latest extortion attempt by DD4BC on Bitcoin companies serves as an example to money being a motivating factor.

This notorious group has been known to launch their DDoS attack on a lower level say 150 requests/sec together with not more than 40Gbps network layer interruptions. This may be presumed to be a low-level attack but is capable of bringing to the ground small and medium size sites.

As early as 2014 November, it is quite evident that DD4BC have been on bitcoin and gaming websites. They have now taken to the payment industry

What next after getting a DDoS ransom note?

A ransom note typically means that you are a victim, there is a possibility your site is not secure anymore and anything could happen anytime, from when you receive the note. In most instances, a complete shutdown or interruption of your website precedes the note to show you that these criminals are in serious business.

Three choices, take no notice of the note, honor the note with quick payment or face it and declare war. Ignoring the note may be a fifty-fifty solution. It could be a signal to the attackers that you already known them and are well prepared for them and so stop their pursuit or actually carry out their threats on your site which might be costly.

Honoring the ransom note apart from costing you the ransom amount is clear evidence of the unpreparedness of your website and lack of DDoS security thereof. It also exposes your site to many more extortions so expect another ransom note.

The third and best option is to fight back. It doesn’t help just sitting back and watching yourself become a puppet in the hands of these extortionists. A good example is Bitalo Bitcoin Exchange, a company that became DD4BC’s first prey. This company refused to be manipulated and publicized this threat. Bitmain Bitcoin Company was second on the list, coming out in public in March 2014 about the threat they had got from DD4BC.

Taking such a bold step as the two companies did is the way to go about it. This step requires preparedness in the form of a professional DDoS protection. You will need to have this protection set on your systems before or as soon as you get a ransom note. Better still, you can acquire a professional DDoS action plan in place in case your site falls victim to these attacks.

Report typos and corrections to admin@hackread.com

  • Tags
  • cyber attacks
  • DDOS
  • Ransomware
  • Scams
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Hack.Chat – Instantly Create A Disappearing Chat Room and Chat Anonymously
Next article Malaysian Police Facebook, Twitter Accounts Hacked by Pro-ISIS Hackers
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Warning as hackers breach MFA to target cloud services

Warning as hackers breach MFA to target cloud services

5 Biggest Ransomware Attacks of All Time

5 Biggest Ransomware Attacks of All Time

Top US Federal Agencies Hacked by Russian Hackers - Report

Top US Federal Agencies Hacked by Russian Hackers - Report

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
NetWalker ransomware disrupted - Cryptocurrency and domain seized
Cyber Crime

NetWalker ransomware disrupted - Cryptocurrency and domain seized

56
Transferring Whatsapp data from iPhone to Android with MobileTrans
How To

Transferring Whatsapp data from iPhone to Android with MobileTrans

31
World's Most 'Resilient Malware' Botnet Emotet Taken Down
Cyber Crime

World's Most 'Resilient Malware' Botnet Emotet Taken Down

147

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us