DDoS Attacks in the United Kingdom
2012 Annual Trends and Impact Survey
2012 Annual Trends and Impact Survey
In both 2011 and 2012, Neustar reported on the DDoS attack landscape in North America. This year, we also surveyed IT pros in the United Kingdom on the growth of attacks and their impact in 2012, as well as the types of DDoS protection organisations use. How severe was the danger? Does it differ between industries? What were the costs of downtime? Are companies prepared to protect their websites and their reputations?
In comparing threats to readiness, the answers are not encouraging.
When DDoS attacks hit, organisations are thrown into crisis mode. From the IT department to call centres, to the board room and beyond, it’s all hands on deck until the danger passes. In April 2013, Neustar surveyed IT professionals across the United Kingdom to understand the impact of DDoS attacks and how companies are managing the crisis. Most respondents self-identified as working in IT, security, compliance or management roles. A total of 381 respondents shared details about attacks, defenses and financial losses. Of this group, 121 worked for ecommerce companies whose success depends on selling products or services online.
This report provides the UK results and compares the UK-specific responses to the April 2012 North American survey findings, detailed in Neustar’s report “Hope is Not a Strategy.” The 2012 findings outline the costs of DDoS attacks, how companies are responding to threats and the unique challenges for companies conducting ecommerce.
Key questions asked include:
the survey also examined the operational impacts associated with DDoS attacks:
22% of UK companies surveyed experienced a disruptive attack in 2012, compared to 35% of respondents in the North American survey. The breakdown of attacks by industry was consistent with other survey results.
Within key industries, the risk of attack varies. Among those companies that were attacked, a high percentage of respondents were in telecommunications (53%), Internet-ecommerce (50%) and online retail (43%). In contrast, the North American survey showed a higher percentage of targets in finance and government.
Among North American respondents, 44% of financial companies reported being attacked, versus just 17% in the United Kingdom. The attacks on US banks by Al Qassam are likely the reason for the disparity; massive attacks were staged from September 2012–April 2013. These attacks have opened the doors for others to mimic the tactics, such as the DDoS attacks against Dutch banking systems in April 2013.
A DDoS attack can inflict a grave toll on revenues. Overall, the survey results varied in showing financial impact, especially when broken down by industry. But to put things in perspective, an outage costing even £1000 per hour would be expensive for a small e-tail site. The industries with the highest losses from an outage were financial services and telecommunications companies.
Financial services and telecom had the highest revenue risks.
DDoS attacks do damage that goes beyond revenue loss. Brand value erodes, along with public reputation and customer trust. If not fixed fast, short-term problems turn into lasting PR issues. For example, customers unsuccessfully trying to buy shoes online are left wondering what happened to their purchases. Did they complete the process? Are their credit card numbers safe? Soon, call centers are flooded with questions and hold times increase. A positive shopping experience becomes a stream of loud complaints. Some customers are forgiving, but certainly not all.
To identify the costs related to DDoS protection, including those specifically associated with attacks, the 2012 survey asked several new questions. The first addressed staffing levels for attack mitigation.
Overall, companies reported that 40% of attacks involved 2 to 5 people in mitigation; 25% required more than 6 people, similar results to the North American survey.
The survey also asked respondents to identify the two areas of their organisation with the greatest increase in operational costs related to a DDoS attack. The IT group was the leading area at 69%, with customer service second at 57%.
Some DDoS attacks today are massive — like nothing seen before. These high-bandwidth attacks use compromised commercial servers versus personal computers, allowing attackers to harness unprecedented system and network resources. This method is also used to launch high-packet rate attacks, which aim to exhaust purpose-built DDoS protection hardware.
While the large attacks make headlines, industry experts agree that a well-crafted, multi-vector attack as small as 2Gbps, a common attack size, can take down a site.
According to a 31 May article published in Techweek Europe (“Europe Sees ‘Extraordinary’ Spike in DDoS Attack Power”),“Attacks over 10Gbps in EMEA were up 23 percent from between 2011 and 2012, but already in 2013 it’s up 82 percent. So far this year, the average size of attacks has increased 84 percent, from 1.06Gbps in all of 2012 to 1.95Gbps in Q1 of 2013.”
Any attack, including Layer 7 application attacks which make up 25% of attacks today, can be measured in terms of bandwidth. Following is a breakdown of UK attacks by bandwidth size.
In early 2013, there were news reports of massive, high-profile DDoS attacks. The attack that shut down Spamhaus, the well-known spam tracker, was reportedly measured at 300+ Gbps. Some attacks on major banks may have reached over 160 Gbps.
But while industry reports estimate that DDoS attacks increased in size an average of 27 percent – from 1.23 Gbps in 2011 to 1.56 Gbps in June 2012 – successful attacks typically use less than 1 Gbps per second. That’s all it takes to bring a website down.
Tracking with the North American results, over a third (37%) of all DDoS attacks in the UK lasted more than 24 hours.
Some attacks stretched out for several days or longer. In fact, 24% of attacks lasted between 3 days and 7+ days. The longest attacks, those lasting over a week, were a significantly higher at 22% compared to only 13% from the North American survey.
A full 20% of responding UK companies reported having no DDoS protection in place. There is a high reliance on devices not built to mitigate DDoS attacks, with switches, routers and firewalls utilized most often.
While it seems as if many companies are covered, it’s important to note the distinction between network protection solutions and DDoS protection solutions. Firewalls, routers and switches can protect against intrusive attacks at Layer 3 (to some extent) but compound the effects of DDoS attacks by allowing malicious traffic to reach networks and bottlenecking traffic. Attacks often target both the network and application layers, with Layer 7 attacks accounting for more than 25% of attacks. Routers are not effective against Layer 7 application attacks.
More respondents used on-premise hardware to mitigate attacks in 2012. Larger organisations with specialised IT staff are best equipped to do this.
“For those organizations that determine they are most at risk and have made the decision to invest budget in a comprehensive DDoS strategy, IDC finds it should include the following: A mix of on-premise and cloud monitoring and mitigation managed internally or externally or a combination of the two.”
Intrusion detection systems are used by 20% of respondents as DDoS protection when, in fact, like a firewall, an IDS becomes a bottleneck during attacks. It can, however, help defend against growing two-pronged attacks, in which DDoS is a distraction while the attacker breaches the system, aiming to steal customer data, government secrets or intellectual property.
Anyone following industry news knows DDoS attacks are worse than ever. They have become the cyber-attacker’s preferred method to create disruption, distract from other crimes or promote a cause. Owing to the barrage against US banks and attacks in other sectors, the topic of DDoS has moved from the IT department to the board room. Neustar’s survey of UK-based organizations reflects these trends in a number of ways:
As in North America, UK companies face serious challenges as they decide on DDoS protection and attempt to mitigate losses. While many companies are hoping traditional defenses will suffice, given the frequency of attacks, their growing complexity and the impact when sites go dark, such hopes are badly misplaced.