Akami finds Q4 2017 DDoS attacks up 14%

Botnet 02

Newly released data that analyzed more than 7.3 trillion bot requests per month found a sharp increase in the threat of credential abuse, with more than 40 percent of login attempts being malicious, according to the Fourth Quarter, 2017 State of the Internet / Security Report released by Akamai Technologies.

According to the Ponemon Institute, credential stuffing attacks can cost businesses as much as $2.7 million on an annual basis. In addition, Akamai’s data further indicates that DDoS attacks remain a consistent threat and the Mirai botnet is still capable of strong bursts of activity.


Akamai researchers have seen recent hacker activity turning to exploit remote code execution vulnerabilities in enterprise-level software to make enterprise systems part of the botnet threat. For example, hackers have been exploiting vulnerabilities in the GoAhead embedded HTTP server—which has 700,000 potential targets—and Oracle WebLogic Server. Aided by the disclosure of Spectre and Meltdown earlier this year, both vulnerabilities open the door to a new wave of attacks, including the surreptitious installation of crypto mining programs that tie up computing resources.

“A key motive of attackers has always been financial profit. In the past few years, we have seen adversaries move to more direct methods to achieve that goal such as ransomware,” said Martin McKeay, senior security advocate and senior editor, State of the Internet / Security Report. “Crypto mining offers attackers the most direct avenue to monetize efforts by putting money immediately into their cryptowallets.”

Akamai’s findings also confirmed that the total number of DDoS attacks last quarter (Q4 2017) increased 14 percent from the same time last year (Q4 2016). While previous reports from this year showed the intensity of the Mirai botnet fading, Akamai saw a spike of nearly 1 million unique IP addresses from the botnet scanning the Internet in late November, showing that it is still capable of explosive growth.

Bot Activity Drives Rising Threat of Credential Stuffing

On a typical day, Akamai monitors more than 2,750 bot requests per second, which accounts for more than 30 percent of all pure web traffic (excluding video streaming) across its platform. While much of that bot activity is legitimate, cybercriminals are increasingly leveraging bot activity for malicious use. For example, many of the botnets traditionally responsible for DDoS attacks are being used to abuse stolen login credentials. Of the 17 billion login requests tracked through the Akamai platform in November and December, almost half (43 percent) were used for credential abuse.

“Increased automation and data mining have caused a massive flood of bot traffic to impact websites and Internet services. Although most of that traffic is useful for Internet businesses, cybercriminals are looking to manipulate the powerful volume of bots for nefarious gains,” said McKeay. “Enterprises need to watch who is accessing their sites to differentiate actual humans from both legitimate and malicious bots. Not all web traffic and not all bots are created equal.”