Skip to main content
← Back to D Definitions

Distributed denial of service ddos attacks

What Is Distributed Denial of Service (DDoS) Attacks?

A Distributed Denial of Service (DDoS) attack is a malicious cyberattack that aims to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of illegitimate internet traffic. This falls under the broader category of cybersecurity risk within financial technology and operational risk management. The attack essentially clogs the target's resources, making it unavailable to legitimate users. DDoS attacks leverage multiple compromised computer systems as "bots" or "zombies" to collectively flood the target, making it difficult to block the source of the attack due to its distributed nature.

History and Origin

The concept of denial-of-service attacks has existed since the early days of the internet. One of the earliest known instances of a Denial of Service (DoS) attack occurred in 1974 when a 13-year-old student, David Dennis, inadvertently shut down PLATO terminals by sending a problematic command. However, the first widely recognized distributed denial of service attack took place in 1996, targeting Panix, an internet service provider. The attack, known as a SYN flood, incapacitated Panix's servers for several days by overwhelming them with fake connection requests.23, 24

The term "distributed" became more prominent with the development of tools like "Trinoo" in 1999, which allowed attackers to use multiple compromised computers to launch coordinated floods.22 A significant wave of DDoS attacks occurred in February 2000, when a Canadian teenager, using the alias "Mafiaboy," launched massive DDoS attacks against major websites such as Yahoo!, Amazon, eBay, and CNN, causing significant disruptions.20, 21 Over the past three decades, DDoS attacks have evolved from simple pranks to sophisticated weapons used against corporations and government entities, often fueled by hacktivism and geopolitical tensions.18, 19

Key Takeaways

  • DDoS attacks overwhelm a target system with traffic from multiple sources, making it unavailable to legitimate users.
  • The financial services sector is a frequent target for DDoS attacks, leading to potential operational disruptions and reputational damage.16, 17
  • DDoS attacks can vary in technique, including volumetric, protocol, and application-layer attacks.15
  • Mitigation strategies involve identifying and filtering malicious traffic, often with the help of specialized service providers.
  • Regulatory bodies like the SEC emphasize the importance of disclosing material cybersecurity incidents, including DDoS attacks.13, 14

Interpreting the Distributed Denial of Service (DDoS) Attacks

Interpreting a Distributed Denial of Service (DDoS) attack involves understanding its impact on a system's uptime and availability. When a DDoS attack occurs, the primary goal of the attacker is to render a service or network inaccessible. For businesses, especially in the financial sector, this means customers cannot access online banking, trading platforms, or other critical services. The severity of a DDoS attack is often measured by the volume of traffic (e.g., gigabits per second or packets per second) and the duration of the disruption.12

Beyond immediate disruption, a DDoS attack can be a smokescreen for other, more malicious activities, such as data breaches or the deployment of malware. Therefore, interpreting a DDoS event also involves investigating whether it is a standalone attack or part of a larger, multi-vector cyber campaign. Organizations must assess the attack's type (volumetric, protocol, or application-layer) to effectively respond and implement appropriate network security measures.

Hypothetical Example

Imagine "Diversified Bank," an online financial institution. Diversified Bank relies heavily on its website and mobile app for customer transactions, including fund transfers, bill payments, and account management.

One morning, the bank's IT security team notices an unprecedented surge in traffic to their website and API endpoints. Millions of seemingly legitimate, but ultimately fake, requests are flooding their servers from thousands of different IP addresses across the globe. This overwhelming traffic consumes the bank's bandwidth and server processing power, causing the website to slow down significantly and eventually become unresponsive for many legitimate customers. Customers attempting to log in receive error messages, and mobile app transactions fail.

This scenario represents a Distributed Denial of Service (DDoS) attack. The attackers are not attempting to steal data directly but are aiming to disrupt the bank's services, potentially causing reputational damage and financial losses due to lost transactions and customer dissatisfaction. The distributed nature of the attack, originating from numerous compromised devices (a botnet), makes it challenging for the bank to simply block a single source. The bank's incident response team would need to activate its DDoS mitigation plan, likely involving rerouting traffic through a specialized scrubbing center to filter out the malicious requests.

Practical Applications

Distributed Denial of Service (DDoS) attacks have significant practical implications, particularly in the financial sector. They are a common tool used by cybercriminals, hacktivists, and even nation-states to achieve various objectives:

  • Disruption of Financial Services: DDoS attacks can cripple online banking platforms, stock exchanges, and payment gateways, preventing legitimate users from accessing critical financial services. This can lead to direct financial losses for businesses and individuals, as well as significant reputational damage. The financial services sector was the most targeted industry for volumetric DDoS attacks in 2024.10, 11
  • Extortion and Ransom: Attackers may launch a DDoS attack and then demand a ransom payment in exchange for stopping the assault. This is a form of cyber extortion, pressuring organizations to pay to restore their services.
  • Distraction for Other Attacks: DDoS attacks are frequently used as a diversionary tactic to distract security teams while more sophisticated attacks, such as data exfiltration or system compromise, are carried out in parallel.
  • Competitive Disruption: In some cases, competitors or disgruntled individuals may use DDoS attacks to disrupt a rival's operations, causing economic harm and undermining customer trust.
  • Geopolitical and Activist Motivations: Hacktivist groups often employ DDoS attacks to protest or make political statements, targeting government websites or organizations associated with their ideological opponents. Rising geopolitical tensions have contributed to an increase in such attacks against the financial sector.9

Organizations, especially those in critical infrastructure sectors like finance, are urged by agencies such as the Cybersecurity and Infrastructure Security Agency (CISA) to develop robust incident response plans and implement preventive measures against DDoS attacks.7, 8

Limitations and Criticisms

While DDoS attacks are a prevalent cybersecurity threat, their effectiveness and impact can have limitations, and certain criticisms exist regarding mitigation strategies.

One limitation is that a pure DDoS attack, while disruptive, does not typically lead to direct data theft or intellectual property compromise. Its primary goal is denial of service, not information security breaches that expose sensitive data. However, as noted, they can serve as a diversion.

A criticism of some DDoS mitigation strategies is their cost and complexity. Implementing comprehensive DDoS protection can be expensive, requiring specialized hardware, software, or subscription to third-party cloud services that absorb and filter malicious traffic. Smaller organizations with limited IT budgets may struggle to afford the most robust defenses, leaving them vulnerable.

Another limitation is the evolving nature of DDoS attacks. Attackers constantly develop new techniques, such as increasingly sophisticated application-layer attacks or multi-vector attacks that combine different methods.5, 6 This requires continuous adaptation of defense mechanisms, which can be challenging for organizations to keep pace with. Even with sophisticated defenses, a sufficiently large and sustained attack can still cause some level of disruption. The U.S. Securities and Exchange Commission (SEC) emphasizes that public companies must disclose "material" cybersecurity incidents, including DDoS attacks, highlighting the significant impact these events can have on a company's operations and investors' decisions.3, 4

Distributed Denial of Service (DDoS) Attacks vs. Denial of Service (DoS) Attacks

While often used interchangeably, there is a key distinction between a Distributed Denial of Service (DDoS) attack and a Denial of Service (DoS) attack.

FeatureDistributed Denial of Service (DDoS) AttackDenial of Service (DoS) Attack
Source of AttackMultiple compromised systems (botnet)Single source or computer
Volume of TrafficHigh, overwhelming due to coordinated effortsModerate, limited by the capacity of a single source
Difficulty to MitigateMore challenging due to dispersed attack originsEasier to block by identifying and filtering a single source
SophisticationGenerally more sophisticated, often using botnetsSimpler, often relying on a single vulnerability or flood

The fundamental difference lies in the number of attacking sources. A DoS attack originates from a single computer or network connection, aiming to flood a target with traffic or exploit a vulnerability to cause a service disruption. In contrast, a DDoS attack utilizes numerous compromised devices distributed across different locations to launch a coordinated attack. This distributed nature makes DDoS attacks much harder to defend against, as blocking one source is ineffective when thousands of others are simultaneously attacking. Both types of attacks fall under the umbrella of cyber threats and aim to disrupt service availability.

FAQs

What is the primary goal of a DDoS attack?

The primary goal of a Distributed Denial of Service (DDoS) attack is to disrupt the normal operations of a website, server, or network by overwhelming it with excessive, illegitimate traffic, making it unavailable to legitimate users.

How do DDoS attacks differ from other cyberattacks like malware?

DDoS attacks primarily focus on service disruption and availability, whereas malware is typically designed to infiltrate systems, steal data, or gain unauthorized control for purposes like espionage or financial fraud. While a DDoS attack might mask a malware deployment, their core mechanisms and objectives are distinct.

Can individuals be targeted by DDoS attacks?

While large organizations are the most common targets, individuals can also be targeted by DDoS attacks, particularly if they are involved in online gaming, streaming, or have a public online presence that attracts malicious actors. Home internet connections and personal devices can be overwhelmed, leading to a loss of internet access.

What are some common signs of a DDoS attack?

Common signs include unusually slow network performance, unavailability of a particular website, a sudden and unexplained increase in website traffic, or connection issues that affect a wide range of users. These often result in significant system downtime.

How can organizations protect themselves from DDoS attacks?

Organizations can protect themselves by implementing various measures, including deploying DDoS mitigation services, using content delivery networks (CDNs), regularly monitoring network traffic for unusual patterns, and having a robust incident response plan in place.1, 2

Is it illegal to launch a DDoS attack?

Yes, launching a Distributed Denial of Service (DDoS) attack is illegal in most jurisdictions worldwide and can result in severe penalties, including hefty fines and imprisonment. It is considered a form of cybercrime due to its intent to disrupt and cause harm to computer systems and networks.