Article Details

Scrape Timestamp (UTC): 2024-03-21 22:22:39.716

Source: https://www.theregister.com/2024/03/21/fbi_ddos_advice/

Original Article Text

Click to Toggle View

FBI v the bots: Feds urge denial-of-service defense after critical infrastructure alert. You better watch out, you better not cry, better not pout, they're telling you why. The US government has recommended a series of steps that critical infrastructure operators should take to prevent distributed-denial-of-service (DDoS) attacks. Thursday's alert comes just days after the Feds warned about destructive cyber intrusions emanating from China, and also formed a water sector cybersecurity task force that meets today to prevent cybercriminals from disrupting the US water supply. "CISA, FBI, and MS-ISAC urge network defenders and leaders of critical infrastructure organizations to read the guidance provided to defend against this threat," the government agencies said about the report. These are the types of attacks that took down several French government websites earlier this month, and are especially popular with pro-Russia hacktivists who have DDoSed a series of European and American airport websites since the invasion of Ukraine. The joint guide, entitled Understanding and Responding to Distributed Denial-Of-Service Attacks [PDF], distinguishes between denial-of-service (DoS) and DDoS attacks. The former involves a single source of network-flooding traffic while the latter involves multiple sources. The briefing document also provides technical details about three different types of DoS and DDoS techniques. First up: volume-based attacks that aim to overwhelm a target with a massive amount of traffic, thus consuming all the available bandwidth so legitimate traffic can't access the website.  Second comes attacks that exploit vulnerabilities in network protocols, thus causing the website to malfunction or otherwise interfere with its performance. And finally, there's Layer 7, or application-layer attacks that hit flaws in specific apps running on the targeted system. The guide lists 15 best practices that organizations should put in place to protect against these attacks. It starts with the basics: conducting a thorough risk assessment, implementing network monitoring tools and regularly analyzing network traffic to establish a baseline and identify any traffic spikes, which could indicate a botnet-based DDoS flood. It also suggests implementing a Captcha challenge to distinguish between humans and bots, and considering specific DDoS mitigation and load balancing products. Regularly updating and patching all software, operating systems and network devices also made the list — and is just good cybersecurity hygiene all around. Plus, programs like employee training, incident response, and backup and recovery plans are always smart to have in place, and practice regularly, along with network redundancy to help maintain service availability in the event of a DDoS attack.

Daily Brief Summary

DDOS // U.S. Agencies Issue Guidelines to Protect Against DDoS Attacks

The U.S. government has issued guidance to protect critical infrastructure from DDoS attacks.

The alert follows warnings about destructive cyber activities from China and occurs alongside a new cybersecurity task force for the water sector.

Agencies including CISA, FBI, and MS-ISAC recommend that organizations follow their report to defend against these threats.

The guide clarifies the difference between DoS and DDoS attacks and outlines three main attack techniques: volume-based, protocol-based, and application-layer attacks.

A set of 15 best practices is provided, including risk assessments, network monitoring, regular traffic analysis, and implementing Captchas.

Implementing DDoS mitigation strategies, maintaining updated software, and conducting regular employee training are also advised.

The guide stresses the importance of incident response plans, data backup, and network redundancy to protect service availability during an attack.