{"id":5475,"date":"2020-08-03T08:26:06","date_gmt":"2020-08-03T15:26:06","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5475"},"modified":"2020-08-03T08:26:06","modified_gmt":"2020-08-03T15:26:06","slug":"fbi-alert-warns-of-increase-in-disruptive-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/","title":{"rendered":"FBI Alert Warns of Increase in Disruptive DDoS Attacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9<\/span><span style=\"font-weight: 400;\"> (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity &amp; Infrastructure Security Agency (CISA).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Per the FBI alert, \u201cAs early as December 2018, cyber actors began exploiting built-in network protocols to carry out destructive DDoS attacks against US networks. As recently as February 2020, cybersecurity researchers identified new built-in network protocol vulnerabilities that have not yet been exploited but increase the attack surface. This is based on open-source evidence of host-based, mobile, and Internet of Things (IoT) device protocol exploitation, resulting in amplification attacks in networked environments.\u201d\u00a0\u00a0<\/span><\/p>\n<p><b>February 2020. <\/b><span style=\"font-weight: 400;\">Researchers in the United Kingdom identified a vulnerability in the built-in network discovery protocols of Jenkins servers that threat actors could exploit to support DDoS amplification attacks. Jenkins is an open-source automation server for the automation of software development, build creation, testing, and deployment. It was estimated that threat actors could use compromised Jenkins servers to amplify DDoS attack traffic approximately 100 times against the targeted infrastructure.<\/span><\/p>\n<p><b>October 2019.<\/b><span style=\"font-weight: 400;\"> Threat actors exploited Apple\u2019s Remote Management Service (ARMS) to launch DDoS amplification attacks per open-source reporting. The ARMS service would listen in to traffic on port 3283 for incoming commands to remote Apple devices. These could then be used by threat actors to launch DDoS amplification attacks with a 35.5:1 amplification factor.\u00a0<\/span><\/p>\n<p><b>May and August 2019. <\/b><span style=\"font-weight: 400;\">Threat actors exploited the Web Services Dynamic Discovery (WS-DD) protocol to launch over 130 DDoS attacks according to open source reporting. IoT devices were subsequently used to amplify DDoS attacks, according to open-source reporting once again. IoT devices use the WS-DD protocol to detect new Internet-connected devices in close proximity automatically. WS-DD operates using User Datagram Protocol (UDP), enabling threat actors to spoof a victim\u2019s IP address and then floods the target with data from nearby IoT devices.\u00a0<\/span><\/p>\n<p><b>August 2019. <\/b><span style=\"font-weight: 400;\">There were over 600,000 Internet-connected IoT devices with the WS-DD protocol enabled.\u00a0\u00a0<\/span><\/p>\n<p><b>December 2018. <\/b><span style=\"font-weight: 400;\">Threat actors utilized the multicast and command transmission features of the Constrained Application Protocol (CoAP) to conduct DDoS reflection and amplification attacks, once again per open-source reporting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Further, per the FBI alert, \u201cThreat Outlook Cyber actors increasingly are likely to abuse built-in network protocols for DDoS attacks against US networks. While a defense-in-depth strategy calls for the disabling of built-in features, such as ARMS, WS-DD, and CoAP, the loss of functionality to business productivity and connectivity may make implementing these strategies challenging. Moreover, device manufacturers are unlikely to disable such features by default because it would interfere with the user experience. Cyber actors\u2019 abuse of built-in network protocols may enable DDoS amplification attacks to be carried out with limited resources and result in significant disruptions and impact on the targets. In the near term, cyber actors likely will exploit the growing number of devices with built-in network protocols enabled by default to create large-scale botnets capable of facilitating devastating DDoS attacks.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are several specific types of attacks that are used to overwhelm DNS servers, thus rendering the DNS service unavailable. When an attack on the DNS is successful, it can severely degrade or halt enterprise operations. When an enterprise can\u2019t publish the addresses for its web and mail servers, operations degrade rapidly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The two principal DDoS attack methodologies used by threat actors include amplification, referenced heavily in the FBI alert, and reflection. While technically two different attack tactics, attackers often combine amplification and reflection attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An amplification attack is a technique used by threat actors where a small query can trigger a massive response, such as querying for a TXT record or a zone transfer when you haven\u2019t secured zone transfers to only your trusted sources. In this scenario threat actors flood the server with short requests that require long responses, allowing even a relatively weak compute resource to overload a DNS server. The DNS server is so busy attempting to respond to all these illegitimate requests that it doesn\u2019t have time to respond to legitimate ones.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are other variations of DDoS attacks that can cause a significant impact on enterprise operations. A reflection attack sends queries that appear to come from the intended target of the attack. The response, which is typically amplified, is sent to the victim, thereby overwhelming the victim\u2019s network.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this use of this reflection attack vector, the attacker sends a query to a recursive name server with a spoofed source IP address. Instead of the real IP address, the threat actor places the target (victim) IP address as the source IP address. The recursive name server retrieves the answer to the query from the authoritative name server and sends it to the target.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now the threat actor can combine the two techniques by spoofing the targets\u2019 IP address and sending a carefully crafted query that will result in a large payload. This is a very effective and overwhelming DDoS attack scenario.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The authoritative name server provides the amplification, and the recursive name server provides the reflection. This allows the threat actor to attack two different targets at the same time. It also causes the intended target of the amplification attack to infer perhaps that they were attacked by the second victim, which is patently false.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox uses signature-based methods to detect and drop DDoS attacks like DNS amplification and reflection, to keep the DNS servers running. See this <\/span><a href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-datasheet-infoblox-advanced-dns-protection.pdf\"><span style=\"font-weight: 400;\">datasheet<\/span><\/a><span style=\"font-weight: 400;\"> for more information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other sources of information on this attack and the use of these attack techniques may be referenced here:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">FBI\u00a0 PIN Alert 20200721-002 Issued on July 21, 2020, <\/span><a href=\"https:\/\/dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com\/external\/fbi-private-industry-notification-20200721-002.pdf\"><span style=\"font-weight: 400;\">https:\/\/dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com\/external\/fbi-private-industry-notification-20200721-002.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">MITRE ATT&amp;CK Network Denial of\u00a0 Service <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1498\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/techniques\/T1498\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">MITRE ATT&amp;CK Endpoint Denial of Service <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1499\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/techniques\/T1499\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">MITRE ATT&amp;CK Network Denial of Service: Reflection Amplification <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1498\/002\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/techniques\/T1498\/002\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.databreachtoday.com\/fbi-reportedly-says-ddos-attack-targeted-voter-registration-a-13691\"><span style=\"font-weight: 400;\">https:\/\/www.databreachtoday.com\/fbi-reportedly-says-ddos-attack-targeted-voter-registration-a-13691<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.databreachtoday.com\/european-bank-targeted-in-massive-packet-based-ddos-attack-a-14505?\"><span style=\"font-weight: 400;\">https:\/\/www.databreachtoday.com\/european-bank-targeted-in-massive-packet-based-ddos-attack-a-14505?<\/span><\/a><\/li>\n<\/ul>\n<p>\u00b9<a href=\"https:\/\/dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com\/external\/fbi-private-industry-notification-20200721-002.pdf\">https:\/\/dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com\/external\/fbi-private-industry-notification-20200721-002.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity &amp; Infrastructure Security Agency (CISA). Per the FBI alert, \u201cAs early [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":2689,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[308,70,189,36],"class_list":{"0":"post-5475","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-fbi","9":"tag-ddos","10":"tag-cybersecurity","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>FBI Alert Warns of Increase in Disruptive DDoS Attacks<\/title>\n<meta name=\"description\" content=\"Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity &amp; Infrastructure Security Agency (CISA).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI Alert Warns of Increase in Disruptive DDoS Attacks\" \/>\n<meta property=\"og:description\" content=\"Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity &amp; Infrastructure Security Agency (CISA).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-03T15:26:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"FBI Alert Warns of Increase in Disruptive DDoS Attacks\",\"datePublished\":\"2020-08-03T15:26:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/\"},\"wordCount\":1043,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"keywords\":[\"FBI\",\"DDoS\",\"Cybersecurity\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/\",\"name\":\"FBI Alert Warns of Increase in Disruptive DDoS Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"datePublished\":\"2020-08-03T15:26:06+00:00\",\"description\":\"Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity & Infrastructure Security Agency (CISA).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Survey Says . . . \u201cExchanging Cyber Threat Intelligence: There Has to Be a Better Way\u201d\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"FBI Alert Warns of Increase in Disruptive DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FBI Alert Warns of Increase in Disruptive DDoS Attacks","description":"Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity & Infrastructure Security Agency (CISA).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"FBI Alert Warns of Increase in Disruptive DDoS Attacks","og_description":"Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity & Infrastructure Security Agency (CISA).","og_url":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2020-08-03T15:26:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"FBI Alert Warns of Increase in Disruptive DDoS Attacks","datePublished":"2020-08-03T15:26:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/"},"wordCount":1043,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","keywords":["FBI","DDoS","Cybersecurity","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/","name":"FBI Alert Warns of Increase in Disruptive DDoS Attacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","datePublished":"2020-08-03T15:26:06+00:00","description":"Last week, on July 21, 2020, the Federal Bureau of Investigation sent out a private industry notification\u00b9 (PIN) 20200721-002 that threat actors are scaling operations to conduct massive and destructive DDoS amplification attacks. The FBI coordinated and released this PIN notice with the Cybersecurity & Infrastructure Security Agency (CISA).","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","width":660,"height":454,"caption":"Survey Says . . . \u201cExchanging Cyber Threat Intelligence: There Has to Be a Better Way\u201d"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/fbi-alert-warns-of-increase-in-disruptive-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"FBI Alert Warns of Increase in Disruptive DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5475"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5475\/revisions"}],"predecessor-version":[{"id":5476,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5475\/revisions\/5476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2689"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}