Telecoms - Beware Of The DDoS Threat Actor

Recently, the number of internet users has skyrocketed, reaching 5.44 billion people. That means more than two-thirds of the world’s population is now connected through the worldwide web. However, with this comes growing concern around the threat of large-scale cyberattacks - and we are already seeing an upward trend in the number of distributed denial-of-service (DDoS) attacks being launched.

In the second half of 2023, NETSCOUT observed over 7 million DDoS attacks, representing a 15 percent increase on the first half of the year. Across 2023, NETSCOUT's findings revealed that a total of 13,141,562 DDoS attacks were launched globally. 

These attacks are driven by an increasing number of sophisticated threat actors who are continually adapting their methods and discovering new attack vectors. They can have significant and costly impacts on organisations across various industries, like telecommunications.

Targeting The Telecommunications Sector

Looking again at the last six months of 2023, wired telecommunications carriers throughout EMEA experienced a wave of DDoS attacks, with over 650,000 taking place, marking an eight percent increase on the first half of 2023. In fact, wired and wireless telecoms providers were the two most targeted industries throughout the year across EMEA. 

DDoS attacks pose a major threat to telcos due to the damage they can cause. An attack can incapacitate users, preventing access to essential online services, websites and business-critical applications by forcefully taking them offline. This impacts not only operational capabilities but also damages the organisation's reputation.

Telecoms providers play a critical role in facilitating global connectivity, making them an attractive target for cybercriminals.

When attackers target telcos, there is a chain reaction through the ecosystem, potentially disrupting internet access for millions of customers and severely hampering business operations. The extensive customer base of these providers also makes them a prime target for cybercrime.

Why DDoS Attacks Against This Industry Are Rapidly Increasing 

The number of attacks against wireless providers has increased in tandem with the number of commercial 5G networks being deployed globally. According to Statista, the number of 5G mobile subscribers and devices, which stood at 12.6 million in 2019, is projected to reach 5.9 billion by 2027.  

A significant driver behind this increase is the transition of many users from traditional broadband access to 5G fixed wireless access, with gamers leading the charge.

In fact, most cases of DDoS attacks against service provider networks can be traced back to gaming-related activities, which contributes to the overall increase in DDoS activity across the sector. The growth of 5G wireless connectivity and the number of users choosing 5G as their primary network has also expanded the DDoS attack surface.

Since the end of 2019, there has been a marked rise in DNS query floods designed to overwhelm authoritative DNS servers, with a massive 553 percent increase from 1H2020 to 2H2023. This attack method involves threat actors bombarding the domain name system (DNS) servers with requests, aiming to overwhelm them and trigger a denial of service. Once again, the most targeted industries were wired and wireless telcos, with bad actors deploying increasingly advanced and diverse attacks.

How Can Service Providers Protect Themselves?

Investing in threat intelligence is critical, as it enables providers to spot trends and focus on the most vulnerable attack vectors. Organisations in the sector, or any sector for that matter, should also conduct regular scenario-based training exercises which simulate DDoS attacks to assess the strength of their defences in real time. 

Visibility into network activities is fundamental to combating DDoS threats. By detecting the early indicators of an attack, telcos can better predict and prevent attacks. This intelligence can enable security professionals to limit attack options for threat actors and force them to take a singular approach. Doing so will reduce their potential to exploit vulnerabilities and cause widespread damage.

The threat landscape is constantly evolving, with the volume and complexity of DDoS attacks increasing at pace. This creates unprecedented challenges for telecoms providers, as they are key targets for cybercriminals. As such, all organisations across the industry should take proactive steps now to defend their online infrastructure from current and future threats.

Image: sasha85ru

Richard Hummel is Threat Intelligence lead for NETSCOUT

You Might Also Read: 

Conflict Drives A Significant Increase In DDoS Attacks:

DIRECTORY OF SUPPLIERS - DDoS Protection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« The Key Components Of Embedded Systems Development Services
Online Fraud - Police Agencies Recover Stolen $Millions »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Sardine

Sardine

Sardine is a leader in financial crime prevention. Using unparalleled device intelligence and behavior biometrics, Sardine applies machine learning to detect and stop fraud before it happens.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.