A cyber attack has knocked Liberia’s internet offline, as hackers targeted the nation’s infrastructure using the same method that shut down hundreds of the world’s most popular websites at the end of last month. Multiple attacks against Liberia’s internet infrastructure have intermittently taken the country’s websites offline over the course of a week. IT security experts from NSFOCUS and ESET commented below.
Stephen Gates, Chief Research Intelligence Analyst at NSFOCUS:
“Researchers and analysts (like myself) have been warning organisations all over the world that this day would come, and now it’s here. Since the attacks on Spamhaus in early 2013 that exceeded 300Gbps, taking a country offline in a DDoS attack became more of a reality. Doing the math, a 1Tbps DDoS attack can fill 100 – 10Gbps pipes. Many smaller countries don’t have that much bandwidth serving their entire country.
Sabotaging parts of the “Internet” in the U.S. on election day is quite possible. However, polling machines in the U.S. are not directly connected to the Internet. Unfortunately, it’s still unclear if voter “identification systems” are. In some states, the voter ID must be checked before a voter can proceed. If those systems are connected to the Internet to gain access to a database of registered voters, and they were taken offline, then would-be voters could not be verified. What that would mean to the election process is anyone’s guess.”
Mark James, Security Specialist at ESET:
“DDoS attacks are certainly becoming more and more popular especially since the means to instigate them are easy to come by. With so many more of our events being bolstered or even completely run online it does pose a very real problem. We want things available at ease; we often rely very heavily on the internet to help us in our daily activity. With so many things done in real time on our handheld devices the disruption caused by intermittent or failed internet could have serious effects if ongoing. Often DDoS is seen as a voice, a means to express your displeasure or concern over something you feel strongly about but let’s not forget that DDoS may also be used as a smoke screen to cover malware or other nefarious activity.
We will see an increase in DDoS activity whilst default passwords are left on devices. It is imperative these days the second thing you do after unboxing is change that password (and username if possible). Complex and unique is great but honestly anything is better than the default. Protecting against this type of attack is very manageable and with help can limit the damage caused. DDoS is often viewed as affecting only large organisations but anyone can be susceptible to this type of attack and you should factor it in when looking at your overall defences.”
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
“First of all, it should be praised that Ferrari have…
These findings aren’t very surprising given that unpatched zero-days provide…
These figures from Mandiant highlight how attackers are continuing to…
Just one week after the Zoll Medical data breach that…
Independent Living Systems (ILS), a Miami-based healthcare software firm providing…