Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The FBI Warns That DDoS Attacks are On the Rise

b2ap3_thumbnail_ddos_prevention_400.jpgIf you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing world. Even the FBI has acknowledged the threat, and has issued a warning that the most likely type of cyber extortion users will encounter is probably going to be DDoS attacks.

A Distributed Denial of Service (DDoS) attack is generally identified as an attack that targets a server with an exorbitant amount of traffic it can’t handle, forcing it down until the attack is over. This is an extreme inconvenience for site visitors and employees trying to access information, but it’s even more frustrating to business owners who are losing money from the downtime DDoS attacks cause. Now, hackers are taking advantage of the costs of DDoS attacks to extort even more money from users, much in the same way as ransomware. As explained by the Internet Crime Complaint Center, “the victim business receives an email threatening a distributed denial-of-service (DDoS) attack to its website unless it pays a ransom."

In order to preserve their identities, hackers ask that the ransom be in bitcoin so the ransom cannot be traced back to them. Due to the increasingly popular nature of DDoS attacks, it’s safe to assume that hackers are making a pretty penny from these kinds of threats. To make matters worse, DDoS attacks can even be done by a complete amateur, which makes them even more dangerous than your typical hack. As explained in the official public service announcement from the FBI:

Businesses that experienced a DDoS attack reported the attacks consisted primarily of Simple Discovery Protocol (SSDP) and Network Time Protocol (NTP) reflection/amplification attacks, with an occasional SYN-flood and, more recently, Wordpress XML-RPC reflection/amplification attack. The attacks typically lasted one to two hours, with 30 to 35 gigabytes as the physical limit.

Due to the nature of the attacks, DDoS threats are difficult to dodge completely. Since the server is being targeted by an excessive amount of bandwidth and traffic from all sorts of different IPs, it’s borderline impossible to block it completely. Your best chance to keep these threats at bay is to check where all of the traffic is coming from, and block the IPs that are targeting your server. This can keep attacks from the same source under control, and you can even block entire countries that are known for housing hackers to minimize the risk.

If your business is concerned about the rise of DDoS attacks, you can trust Voyage Technology to help. We can help your company optimize its security and prepare for any downtime disaster. Give us a call at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 01 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones VoIP AI Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Automation Information Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Employee/Employer Relationship Spam Encryption IT Support Windows 10 Office Government Business Continuity Data Management Bandwidth Virtualization Business Technology Blockchain Wi-Fi Windows 10 Apps Vendor Mobile Office Two-factor Authentication Data Security Chrome Budget BYOD Apple Managed Services Employer-Employee Relationship Voice over Internet Protocol App Tip of the week Mobile Device Management Networking Gmail WiFi Conferencing Access Control Hacker Avoiding Downtime Computing HIPAA Information Technology Marketing Applications How To Office 365 BDR Augmented Reality Storage Password Big Data Bring Your Own Device Virtual Private Network Health Healthcare Computers Operating System Retail Router Website 2FA Risk Management Managed IT Services Analytics Office Tips Help Desk Patch Management Save Money Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Social Telephone Physical Security Display Printer Remote Workers Cooperation Paperless Office Infrastructure Going Green Customer Service Free Resource Document Management Cybercrime Project Management Windows 11 Windows 7 Microsoft 365 Scam Data loss Excel Solutions Firewall Monitoring Robot Money Safety Humor Saving Time Holidays Data Privacy Data Storage Sports IT Management Managed IT Service Mouse VPN Video Conferencing Meetings Managed Services Provider Downloads Virtual Machines Professional Services Licensing Administration Computer Repair Entertainment Customer Relationship Management iPhone Hacking Settings Telephone System Presentation Printing Wireless Cost Management Machine Learning Vulnerabilities Content Filtering Wireless Technology Images 101 YouTube Maintenance Multi-Factor Authentication Mobility Cryptocurrency Supply Chain Antivirus User Tip Modem Word Virtual Desktop Processor Mobile Security Data storage LiFi Employees Integration Outlook Smart Technology Language Scams Surveillance Addiction Travel Virtual Assistant Management Google Maps Virtual Machine Chatbots Undo Hybrid Work Techology Human Resources Hacks Reviews Scary Stories Screen Reader Medical IT Distributed Denial of Service Computing Infrastructure Cables Development Fun Service Level Agreement Unified Threat Management Transportation Hypervisor Identity Deep Learning Unified Threat Management Google Apps Shopping Bookmark Optimization Smart Tech PowerPoint Alerts Network Congestion Application IT Maintenance Education Download Employer/Employee Relationships Navigation Business Intelligence User Error PCI DSS Shortcuts Mobile Computing Gig Economy Browsers Connectivity IBM Break Fix Ransmoware Internet Service Provider Search Upload Point of Sale Teamwork Social Network Evernote Multi-Factor Security Vendors Best Practice Regulations Compliance Be Proactive Buisness Network Management Memes IoT Tech Support Dark Web Monitors Workforce Legal IT solutions Net Neutrality Trends SQL Server Customer Resource management History Regulations Competition Google Calendar Threats Business Growth Financial Data Workplace Strategies Smartwatch Data Analysis IT Star Wars Websites Microsoft Excel Staff Meta Procurement Cortana Gamification Azure Telework Cyber security Social Networking Electronic Medical Records Tech Legislation Amazon Alt Codes SharePoint User CES Downtime Fileless Malware Communitications Wearable Technology Writing Outsource IT Hosted Solution Lenovo Supply Chain Management Content FinTech Health IT Motherboard Virtual Reality Term Comparison Environment Media Typing Directions Server Management IT Assessment Assessment Private Cloud IP Address Permissions Value Small Businesses Google Drive Superfish Flexibility Knowledge Identity Theft Organization Twitter Specifications Displays Recovery Digital Security Cameras Microchip Smart Devices 5G Internet Exlporer Error Fraud Memory Social Engineering Hard Drives Outsourcing Google Docs Unified Communications Remote Working Experience Username Running Cable Data Breach Remote Computing Google Play Domains Black Friday Bitcoin Workplace Google Wallet Videos Electronic Health Records Database Tablet Wasting Time IT Technicians Refrigeration Hiring/Firing Laptop Proxy Server Trend Micro Cookies Alert Security Cameras Public Speaking Cyber Monday Paperless Windows 8 Dark Data Co-managed IT Drones Managed IT Software as a Service Tactics File Sharing Lithium-ion battery Hotspot Managing Costs Mirgation How To Technology Care Entrepreneur Halloween eCommerce Nanotechnology Notifications SSID Business Communications

Blog Archive