In the past couple of weeks, a number of well-known and respected web hosting providers have fallen prey to very sophisticated large scale DDoS attacks. As the attacks continued on for hours, their clients became increasingly frustrated, because their clients in turn were posing some very tough questions of them.
Communication is Key to Mitigating Churn
How well received these providers’ efforts were to mitigate these attacks hinged around communications with their clients – essentially meaning how well they kept their clients informed. A good number of clients fully understand the complexities of fighting off these attacks, but when their business began to suffer from prolonged outages, some of them started scrambling to find new providers.
The Frequency of Attacks has Increased
Cybercriminals are increasing the frequency of their attacks, and now have intensified their efforts with Ransomware attacks. These attacks involve encrypting data on a government or corporate website and then demanding ransom money, usually Bitcoin, to unlock it. The combination of these two types of attacks are the dark side of the Internet – its criminal underbelly.
Focus on the Web Hosting Industry
Ransomware is essentially a criminal way to exhort money, but why DDoS attacks, especially in the web hosting industry? Providers are simply looking to offer decent hosting services to thousands of individuals and businesses, and provide employment to people needing jobs. The cybercriminals that perpetrate these attacks are a very sick underbelly of society and belong behind bars.
Dealing with Ransomware
The consensus is that recovering data that has been encrypted by a ransomware attack is very close to impossible (without actually having the decryption keys). One solution is to have a remote backup of your site, meaning you need to think ahead and be proactive instead of reactive.
Prevention is Key to Blocking Ransomware Threats
While backups are a viable solution, there are measures that you can take to prevent attacks, such as authenticating your inbound email. Why? Email has been and will continue to be a common way to distribute malware. Attackers are experts at spoofing emails that contain malicious attachments, that when opened, spread their garbage on the victim’s system.
By validating email origins before they’re delivered, using sender identity technologies like SPF, DMARC and DKIM, firms can shield themselves from spear phishing and other threats.
Taking email protection one more step
While sender authentication helps, businesses also need to scan all stored, outgoing and incoming mail to detect threats that may have slipped through the cracks. Numerous tools are available like GFI MailEssentials® and others.
Why it’s important to monitor file activity
Ransomware poses a threat not just to individuals within an organization, but to the enterprise at large, including shared files. Attackers accomplish this executing rapid file overwriting, but fortunately there are programs available to detect this type of malicious activity and minimize it. Early detection is the key, placing the infected site in quarantine mode.
Be very aware of malicious advertisements
Attackers are very adept at distributing ransomware, especially via ads targeting specific users based on their habits. These very often are quite dangerous as they provide clues to the attackers about their potential victims.
Brought to you by ProlimeHost
We’ve been in the web hosting industry for ten years, helping hundreds of clients succeed in what they do best and that’s running their business. We specialize in dedicated servers, with data centers in Los Angeles, Phoenix, Denver and Singapore.
The E3 1275 v5 processor is now available at great pricing, giving you the ability to add up to 64GB of DDR4 ECC RAM. Call +1 877 477 9454 or email us at Sales@ProlimeHost.com. We’re here to help.
Latest posts by Steve (see all)
- How data centers and web hosting providers are interconnected – What you need to know - February 21, 2020
- Trying to decide between a managed or unmanaged dedicated server? What you need to know! - February 21, 2020
- How SATA, SAS and SSD drives differ. What you should know. - February 20, 2020