Cyber criminals are always waiting to exploit people’s anxiety to deploy their attacks. On March 16, The US Health and Human Service (HHS) Department website was hit by a DDOS attack, affecting the website latency for hours. Albeit, COVID-19 is causing tremors across the globe it is completely surprising to see attackers taking down the healthcare during this crisis. Paradoxically, this is what the criminals are looking forward to, website with high traffic and serves key purpose.
HHS was a crucial site to them and CDC to share updates on COVID-19, the measures that is being carried out by the department and how things were kept under control. Along with DDOS attacks, it is also believed that the attackers have sent some rumours about a national lock down via SMS, e-mail and social media. On March 16th, Alex Azar, Secretary of HSS said “We had no penetration into our networks, we had no degradation of the functioning of our networks”, at the White House.
Furthermore, according to the reports from Bloomberg, the attackers didn’t enjoy the complete benefits of the DDOS attack, as the website wasn’t totally affected and was able to withstand the overloading decently. An HHS spokeswoman also confirmed that they are increasing their security measures to keep thing intact and investigating this cyber incident further to obtain the complete details of the act. As such, HHS has mentioned that this act was enacted by a foreign state and further information are sensitive to be disclosed now.
DDOS attacks can be deadly if left undetected, the case of GitHub is one historic example of the attack and how they combated it. Building effective firewalls, monitoring network traffic and using DDOS scrubbing centres for protection and mitigation. Watch the below video, to understand the DDOS attack from scratch and how can enterprises fortify their defenses against this traffic overloading attack.
In last one month, there have been numerous cyberattacks that are leveraging upon the COVID-19 trend. Watch out for phishing emails, sudden traffic overloads in the IT infrastructure, and do not download coronavirus ransomware apps from unknown sources.
Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…