Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The FBI Warns That DDoS Attacks are On the Rise

b2ap3_thumbnail_ddos_prevention_400.jpgIf you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing world. Even the FBI has acknowledged the threat, and has issued a warning that the most likely type of cyber extortion users will encounter is probably going to be DDoS attacks.

A Distributed Denial of Service (DDoS) attack is generally identified as an attack that targets a server with an exorbitant amount of traffic it can’t handle, forcing it down until the attack is over. This is an extreme inconvenience for site visitors and employees trying to access information, but it’s even more frustrating to business owners who are losing money from the downtime DDoS attacks cause. Now, hackers are taking advantage of the costs of DDoS attacks to extort even more money from users, much in the same way as ransomware. As explained by the Internet Crime Complaint Center, “the victim business receives an email threatening a distributed denial-of-service (DDoS) attack to its website unless it pays a ransom."

In order to preserve their identities, hackers ask that the ransom be in bitcoin so the ransom cannot be traced back to them. Due to the increasingly popular nature of DDoS attacks, it’s safe to assume that hackers are making a pretty penny from these kinds of threats. To make matters worse, DDoS attacks can even be done by a complete amateur, which makes them even more dangerous than your typical hack. As explained in the official public service announcement from the FBI:

Businesses that experienced a DDoS attack reported the attacks consisted primarily of Simple Discovery Protocol (SSDP) and Network Time Protocol (NTP) reflection/amplification attacks, with an occasional SYN-flood and, more recently, Wordpress XML-RPC reflection/amplification attack. The attacks typically lasted one to two hours, with 30 to 35 gigabytes as the physical limit.

Due to the nature of the attacks, DDoS threats are difficult to dodge completely. Since the server is being targeted by an excessive amount of bandwidth and traffic from all sorts of different IPs, it’s borderline impossible to block it completely. Your best chance to keep these threats at bay is to check where all of the traffic is coming from, and block the IPs that are targeting your server. This can keep attacks from the same source under control, and you can even block entire countries that are known for housing hackers to minimize the risk.

If your business is concerned about the rise of DDoS attacks, you can trust Voyage Technology to help. We can help your company optimize its security and prepare for any downtime disaster. Give us a call at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 17 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Phishing Workplace Tips Computer Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Productivity Android Upgrade Business Management VoIP Smartphones Mobile Devices communications Data Recovery Disaster Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Cloud Computing Holiday Covid-19 Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Office Windows 10 IT Support Government Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications WiFi How To BDR Operating System Computers Healthcare Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Retail Router Storage Password Bring Your Own Device Big Data Managed IT Services 2FA Help Desk Going Green Patch Management Excel Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Remote Workers Cybercrime Telephone Physical Security Display Printer Paperless Office Cooperation Free Resource Project Management Infrastructure Windows 7 Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Windows 11 Social Monitoring Video Conferencing Robot Customer Relationship Management Managed Services Provider Saving Time Settings Virtual Machines Professional Services Printing Wireless Content Filtering Managed IT Service Hacking IT Management Presentation VPN YouTube Meetings Downloads iPhone Cryptocurrency Wireless Technology Licensing Computer Repair Entertainment Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Multi-Factor Authentication Mobility Outlook Telephone System Machine Learning Cost Management Money Humor Safety Maintenance Employees Sports Integration Antivirus Mouse Modem User Tip Processor Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Travel Addiction Language Employer/Employee Relationships Outsourcing Navigation Techology Google Maps Management PCI DSS Cortana Chatbots Gig Economy Screen Reader Distributed Denial of Service Workplace Alt Codes Competition Downtime Unified Threat Management Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Unified Threat Management Hosted Solution Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Typing Download Net Neutrality Network Congestion Alerts SQL Server Technology Care History Business Communications Google Drive User Error User Financial Data Knowledge Browsers Smartwatch Connectivity IT Break Fix Scams Point of Sale Upload Procurement 5G Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources IP Address Google Docs Unified Communications Social Network Telework Experience CES Running Cable Tech Support IoT Communitications Dark Web Cables Bitcoin Network Management Google Wallet Trends Supply Chain Management Monitors Regulations Google Calendar Term Google Apps Recovery Customer Resource management FinTech Data Analysis Laptop Websites Star Wars IT Assessment Microsoft Excel IT Maintenance Hard Drives Windows 8 Domains Drones Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts SharePoint Organization Electronic Medical Records Fileless Malware Digital Security Cameras Halloween Smart Devices Ransmoware Refrigeration Public Speaking Lenovo Content Remote Working Writing Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Lithium-ion battery Health IT Virtual Reality Directions Videos Entrepreneur Scary Stories Private Cloud Assessment Electronic Health Records Permissions Workforce Hacks Server Management Superfish Identity Theft Fun Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Deep Learning Twitter Microchip Error Internet Exlporer Software as a Service Fraud Meta Undo Education Username Social Engineering Managing Costs Amazon eCommerce Black Friday SSID Remote Computing Database Surveillance Virtual Assistant Outsource IT Mobile Computing Media Tablet Search IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Application Best Practice Proxy Server Reviews Alert Managed IT Buisness File Sharing Tactics Development Dark Data Hotspot Transportation Small Businesses IBM Legal IT solutions How To Mirgation Hypervisor Displays Notifications Nanotechnology Optimization PowerPoint Business Growth Shopping

Blog Archive