Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The FBI Warns That DDoS Attacks are On the Rise

b2ap3_thumbnail_ddos_prevention_400.jpgIf you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing world. Even the FBI has acknowledged the threat, and has issued a warning that the most likely type of cyber extortion users will encounter is probably going to be DDoS attacks.

A Distributed Denial of Service (DDoS) attack is generally identified as an attack that targets a server with an exorbitant amount of traffic it can’t handle, forcing it down until the attack is over. This is an extreme inconvenience for site visitors and employees trying to access information, but it’s even more frustrating to business owners who are losing money from the downtime DDoS attacks cause. Now, hackers are taking advantage of the costs of DDoS attacks to extort even more money from users, much in the same way as ransomware. As explained by the Internet Crime Complaint Center, “the victim business receives an email threatening a distributed denial-of-service (DDoS) attack to its website unless it pays a ransom."

In order to preserve their identities, hackers ask that the ransom be in bitcoin so the ransom cannot be traced back to them. Due to the increasingly popular nature of DDoS attacks, it’s safe to assume that hackers are making a pretty penny from these kinds of threats. To make matters worse, DDoS attacks can even be done by a complete amateur, which makes them even more dangerous than your typical hack. As explained in the official public service announcement from the FBI:

Businesses that experienced a DDoS attack reported the attacks consisted primarily of Simple Discovery Protocol (SSDP) and Network Time Protocol (NTP) reflection/amplification attacks, with an occasional SYN-flood and, more recently, Wordpress XML-RPC reflection/amplification attack. The attacks typically lasted one to two hours, with 30 to 35 gigabytes as the physical limit.

Due to the nature of the attacks, DDoS threats are difficult to dodge completely. Since the server is being targeted by an excessive amount of bandwidth and traffic from all sorts of different IPs, it’s borderline impossible to block it completely. Your best chance to keep these threats at bay is to check where all of the traffic is coming from, and block the IPs that are targeting your server. This can keep attacks from the same source under control, and you can even block entire countries that are known for housing hackers to minimize the risk.

If your business is concerned about the rise of DDoS attacks, you can trust Voyage Technology to help. We can help your company optimize its security and prepare for any downtime disaster. Give us a call at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 28 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Microsoft Small Business Quick Tips Backup Cybersecurity Passwords Saving Money Communication Data Backup Smartphone Managed Service Android Business Management VoIP Smartphones Upgrade Mobile Devices communications Data Recovery Disaster Recovery Productivity Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Remote Network Tech Term Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Holiday Gadgets Managed Service Provider Information Remote Work Miscellaneous Training Server Outsourced IT Compliance Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity IT Support Windows 10 Blockchain Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Networking Mobile Device Management Chrome Gmail Budget BYOD Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Marketing Office 365 How To BDR HIPAA WiFi Applications Access Control Tip of the week Computing Hacker Conferencing Information Technology Avoiding Downtime Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health 2FA Help Desk Operating System Computers Retail Risk Management Healthcare Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Solutions Physical Security Social Display Printer Paperless Office Going Green Windows 11 Infrastructure Monitoring Customer Service Excel Cybercrime Document Management Remote Workers Telephone iPhone Virtual Desktop LiFi Data storage Licensing Entertainment Vulnerabilities Word Data Privacy Outlook Images 101 Money Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Safety Sports Mouse IT Management VPN Employees Meetings Integration Administration User Tip Modem Processor Computer Repair Mobile Security Holidays Customer Relationship Management Settings Data Storage Wireless Printing Smart Technology Supply Chain Content Filtering Video Conferencing Machine Learning Managed Services Provider Hacking Saving Time Virtual Machines Presentation Professional Services YouTube Cryptocurrency Wireless Technology Managed IT Service Maintenance Downloads Antivirus Browsers Smartwatch Connectivity IT Google Wallet Social Engineering Break Fix Scams Recovery Upload Procurement Remote Computing Azure Hybrid Work Social Network Telework Cyber security Hard Drives Windows 8 Multi-Factor Security Tech Human Resources Laptop CES Tablet IoT Communitications Domains Drones Dark Web Cables Alert Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Refrigeration Dark Data Google Calendar Term Google Apps Halloween Data Analysis Star Wars IT Assessment Public Speaking How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Gamification Flexibility Lithium-ion battery Organization Travel Social Networking Hacks Legislation Shortcuts Entrepreneur Scary Stories Fun Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Deep Learning Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Undo Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Education Wasting Time Threats Trend Micro Mobile Computing Network Congestion Specifications Security Cameras Workplace Strategies Search User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Application Best Practice Username Point of Sale eCommerce Black Friday SSID Buisness Database Surveillance IBM Legal Virtual Assistant Outsource IT IT solutions Tech Support IT Technicians Virtual Machine Environment Business Growth Media Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Cortana Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Alt Codes Shopping Nanotechnology Optimization Competition PowerPoint Downtime Hosted Solution SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Typing Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace User Knowledge Service Level Agreement Internet Service Provider Google Drive Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance 5G Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Unified Communications Experience Download Net Neutrality IP Address Google Docs Twitter Alerts SQL Server Technology Care Error History Bitcoin Business Communications Running Cable Financial Data

Blog Archive