ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Issues Warning About the Rise in DDoS Attacks

b2ap3_thumbnail_fbi_warns_ddos_400.jpgDo you know anyone affected by recent ransomware activity? The tragedy of Cryptolocker/Cryptowall, where files are locked down and returned in exchange for a ransom fee, might still be fresh in your minds. Well, the FBI warns that the end of cyber extortion is still far off, and that the next hacking technique that will be used is likely the DDoS attack.

Distributed Denial of Service (DDoS) is generally characterized as an attack that rapidly targets a server with enough traffic to bring it down, effectively terminating site visitors and employees from accessing important information. This has been an effective way for hackers to mildly irritate consumers in the past, but this method is growing more common as a means to extort money from users; much in the same way that ransomware is used to leech money in return for access to your files. As explained by the Internet Crime Complaint Center, “the victim business receives an email threatening a distributed denial-of-service (DDoS) attack to its website unless it pays a ransom."

To avoid being tracked back to the hackers, the ransom is often required to be bitcoin. Attacks like this “ransomware” are growing more common, as they are proving to be lucrative sources of income for hackers who know what they’re doing. In fact, DDoS attacks can even be performed by an amateur user under the right circumstances. As explained in the official public service announcement from the FBI:

Businesses that experienced a DDoS attack reported the attacks consisted primarily of Simple Discovery Protocol (SSDP) and Network Time Protocol (NTP) reflection/amplification attacks, with an occasional SYN-flood and, more recently, Wordpress XML-RPC reflection/amplification attack. The attacks typically lasted one to two hours, with 30 to 35 gigabytes as the physical limit.

DDoS attacks are difficult to dodge completely. Since the server is being targeted by huge amounts of traffic or bandwidth, this can make protecting against them difficult at best. If you become the target of a DDoS attack, try to check where the traffic is primarily coming from. Your best bet is to block access to your server from the IPs constantly targeting it. This helps to prevent further attacks from the same source. It can also be worth completely blocking countries that are known for housing hackers.

If your organization is concerned about DDoS attacks, you can trust ClearView IT to help you through this difficult time. We can help your organization optimize security so that you have little to fear from attacks. And remember; never give in to the demands of hackers. They’re basically bullies with a fancy moniker. Give us a call at 866-326-7214 for tech support that will never abandon you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Gadgets Managed IT services Networking Workplace Strategy Windows Mobile Device Management Spam Business Technology WiFi Blockchain Bandwidth Server Encryption Information Remote App Virtualization Two-factor Authentication Office 365 Apple Information Technology History Gmail Employee/Employer Relationship Budget Office BDR Analytics Conferencing Cybercrime Access Control Data Security Health Wi-Fi Big Data Remote Computing Voice over Internet Protocol Cost Management IT Management Hacker Training Document Management Compliance Save Money Patch Management Employer-Employee Relationship Vendor Help Desk Hacking Remote Monitoring Hiring/Firing Outlook Computing Vendor Management Password Hard Drive Mobile Office Managed Services Money Data loss Customer Service Unified Threat Management Firewall Legal Data storage Augmented Reality Word Search... Best Practice IBM Website Applications Retail Alert Project Management BYOD Vulnerabilities User Monitoring Healthcare Laptop Websites Remote Workers Mobility Meetings Chrome Windows 7 Free Resource Twitter Google Maps Scam Law Enforcement How To Sports Social End of Support SaaS DDoS Printer Mobile Computing VPN Marketing Update iPhone Running Cable Education Cortana Content Filtering Travel Data Breach Storage Virtual Reality Social Engineering Router Cryptocurrency Paperless Office Black Market Antivirus Maintenance Cleaning The Internet of Things Robot YouTube Windows 11 Multi-factor Authentication Start Menu Professional Services Wireless Technology Solid State Drive Downloads Computer Care eWaste Vulnerability Saving Time Drones Managed Services Provider Downtime Chromebook Software as a Service Data Protection Computers Bitcoin Safety Automobile Virtual Private Network Telephone Virtual Desktop Current Events PowerPoint Experience How To Microchip Administration Flexibility Excel Solutions Presentation Specifications Tech Terms Images 101 IT Consultant Integration Display Disaster Hack Identity Theft Notifications Managed IT Digital Unified Communications Virtual Assistant Customer Relationship Management Co-Managed IT Employees Google Docs Entertainment Lithium-ion battery Bluetooth Taxes Avoiding Downtime Distributed Denial of Service Office Tips Holidays Private Cloud Processor Memory Processors Cooperation Video Conferencing Physical Security Politics Virtual Machines Machine Learning Settings Computer Repair HIPAA Google Wallet Licensing Public Speaking Banking Touchscreen PCI DSS Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Streaming Media Computer Malfunction Fake News Supply Chain Keyboard Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Hosted Solution Samsung Device security Managed IT Service Business Owner Hard Drives Business Metrics Management Regulations Compliance intranet Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Wireless Shortcut Tech Human Resources Language Business Mangement Going Green Net Neutrality Society Business Cards Tablets Heating/Cooling Environment Error Financial Data Social Networking Reading Bookmark Risk Management Monitors IT Windows XP Visible Light Communication Scams Google Calendar Term Google Apps Download Windows 8 Supercomputer Piracy Virus Telework HTML Inbound Marketing Relocation Browsers Smartwatch Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Tech Support Software License Comparison Google Play Work/Life Balance Google Drive Upload Procurement Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Electronic Payment Point of Sale Employer Employee Relationship Mobile Technology Value Staffing In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Hacks Customer Resource management Organization Network Congestion Cabling Devices Cyber security Shortcuts IP Address Reliable Computing Fileless Malware Writing Tablet Smart Devices G Suite Tip of the week Phone System Tracking Company Culture Mouse VoIP Gamification Remote Working Telephone System AI Regulations Trend Micro Be Proactive Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Proactive IT Digital Payment Desktop Wasting Time Recovery Competition Administrator SharePoint Text Messaging Content Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Computer Accessories Entrepreneur Videos Access Database Surveillance LiFi Music Public Cloud Managing Costs Documents Application Time Management Health IT Equifax SSID Business Intelligence Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships File Sharing Virtual Machine Securty Botnet Username Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology Domains Navigation 2FA Flash Cache Addiction email scam Teamwork Business Growth Workers Mobile Security Hypervisor Troubleshooting Telephone Systems Unified Threat Management Data Storage User Tip Shopping Legislation News Medical IT Printing Evernote Paperless Network Management CCTV SQL Server

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?