![]() In a ransom DDoS update, Radware covered the tactic of circling back and how extortionists were trying to accelerate their campaign to profit from the surge in Bitcoin. It has been almost a year since a malicious actor, going by the names "Fancy Bear" and "Lazarus Group," started targeting finance, travel and e-commerce organizations in what has been one of the most extensive and longest-running DDoS extortion campaigns in history. While it might sound entertaining, it very much describes the latest tactics employed by DDoS extortionists. "Fantasy APT looking for unprotected assets," sounds like a classified advertisement you typically find in the newspaper. No target is too small or too big.Ī DDoS extortion group identifies and targets organizations with unprotected assets and invites them to pay a ransom while threatening with devastating DDoS attacks. Going by the name "Fancy Lazarus," the action radius of this extortion group has been extending to organizations of all sizes across the world and in all verticals. Several internet service providers (ISPs) and cloud service providers (CSPs) have reported receiving ransom letters followed by DDoS attacks that impacted their services and availability. ![]() In the past few weeks, Radware's Cloud DDoS Protection Service has been seeing a significant increase in DDoS activity and has been rapidly onboarding new customers in distress. ![]() Download the Complete Alert "Fantasy APT Seeking Unprotected Assets" ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |