Telecoms - Beware Of The DDoS Threat Actor

Recently, the number of internet users has skyrocketed, reaching 5.44 billion people. That means more than two-thirds of the world’s population is now connected through the worldwide web. However, with this comes growing concern around the threat of large-scale cyberattacks - and we are already seeing an upward trend in the number of distributed denial-of-service (DDoS) attacks being launched.

In the second half of 2023, NETSCOUT observed over 7 million DDoS attacks, representing a 15 percent increase on the first half of the year. Across 2023, NETSCOUT's findings revealed that a total of 13,141,562 DDoS attacks were launched globally. 

These attacks are driven by an increasing number of sophisticated threat actors who are continually adapting their methods and discovering new attack vectors. They can have significant and costly impacts on organisations across various industries, like telecommunications.

Targeting The Telecommunications Sector

Looking again at the last six months of 2023, wired telecommunications carriers throughout EMEA experienced a wave of DDoS attacks, with over 650,000 taking place, marking an eight percent increase on the first half of 2023. In fact, wired and wireless telecoms providers were the two most targeted industries throughout the year across EMEA. 

DDoS attacks pose a major threat to telcos due to the damage they can cause. An attack can incapacitate users, preventing access to essential online services, websites and business-critical applications by forcefully taking them offline. This impacts not only operational capabilities but also damages the organisation's reputation.

Telecoms providers play a critical role in facilitating global connectivity, making them an attractive target for cybercriminals.

When attackers target telcos, there is a chain reaction through the ecosystem, potentially disrupting internet access for millions of customers and severely hampering business operations. The extensive customer base of these providers also makes them a prime target for cybercrime.

Why DDoS Attacks Against This Industry Are Rapidly Increasing 

The number of attacks against wireless providers has increased in tandem with the number of commercial 5G networks being deployed globally. According to Statista, the number of 5G mobile subscribers and devices, which stood at 12.6 million in 2019, is projected to reach 5.9 billion by 2027.  

A significant driver behind this increase is the transition of many users from traditional broadband access to 5G fixed wireless access, with gamers leading the charge.

In fact, most cases of DDoS attacks against service provider networks can be traced back to gaming-related activities, which contributes to the overall increase in DDoS activity across the sector. The growth of 5G wireless connectivity and the number of users choosing 5G as their primary network has also expanded the DDoS attack surface.

Since the end of 2019, there has been a marked rise in DNS query floods designed to overwhelm authoritative DNS servers, with a massive 553 percent increase from 1H2020 to 2H2023. This attack method involves threat actors bombarding the domain name system (DNS) servers with requests, aiming to overwhelm them and trigger a denial of service. Once again, the most targeted industries were wired and wireless telcos, with bad actors deploying increasingly advanced and diverse attacks.

How Can Service Providers Protect Themselves?

Investing in threat intelligence is critical, as it enables providers to spot trends and focus on the most vulnerable attack vectors. Organisations in the sector, or any sector for that matter, should also conduct regular scenario-based training exercises which simulate DDoS attacks to assess the strength of their defences in real time. 

Visibility into network activities is fundamental to combating DDoS threats. By detecting the early indicators of an attack, telcos can better predict and prevent attacks. This intelligence can enable security professionals to limit attack options for threat actors and force them to take a singular approach. Doing so will reduce their potential to exploit vulnerabilities and cause widespread damage.

The threat landscape is constantly evolving, with the volume and complexity of DDoS attacks increasing at pace. This creates unprecedented challenges for telecoms providers, as they are key targets for cybercriminals. As such, all organisations across the industry should take proactive steps now to defend their online infrastructure from current and future threats.

Image: sasha85ru

Richard Hummel is Threat Intelligence lead for NETSCOUT

You Might Also Read: 

Conflict Drives A Significant Increase In DDoS Attacks:

DIRECTORY OF SUPPLIERS - DDoS Protection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« The Key Components Of Embedded Systems Development Services
Online Fraud - Police Agencies Recover Stolen $Millions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.