{"id":42300,"date":"2021-08-27T15:41:25","date_gmt":"2021-08-27T19:41:25","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=42300"},"modified":"2021-08-27T15:41:27","modified_gmt":"2021-08-27T19:41:27","slug":"ddos-update-something-old-something-new","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/","title":{"rendered":"DDoS Update: Something Old, Something New"},"content":{"rendered":"\n<p>Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of <a href=\"https:\/\/www.imperva.com\/learn\/ddos\/ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS attacks<\/a> and extortion threats, become a notable force in enterprise SecOps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DDoS Trends: Something New and More of the Same, Sad, Song<\/strong><\/h2>\n\n\n\n<p>DDoS attacks are a class of malicious exploit that makes online services unavailable to users. Bad actors launch their attacks by using many (sometimes hundreds of thousands) of infected, widely distributed internet-connected devices, called bots. Malicious software enables a command bot to communicate with and control infected devices remotely. Increasingly sophisticated attacks now use AI to make attacks more adaptable and responsive to changing conditions in the attack environment.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>RDDoS attacks: A new way to deliver digital mayhem<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.inc.com\/neill-feather\/this-type-of-cyberattack-could-seriously-hurt-your-small-business-here-are-3-ways-to-protect-yourself.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/This-Type-of-Cyberattack-Could-Seriously-Hurt-Your-Small-Business.-Here-Are-3-Ways-to-Protect-Yourself-1024x576.jpg\" alt=\"\" class=\"wp-image-42303 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/This-Type-of-Cyberattack-Could-Seriously-Hurt-Your-Small-Business.-Here-Are-3-Ways-to-Protect-Yourself-1024x576.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/This-Type-of-Cyberattack-Could-Seriously-Hurt-Your-Small-Business.-Here-Are-3-Ways-to-Protect-Yourself-768x432.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/This-Type-of-Cyberattack-Could-Seriously-Hurt-Your-Small-Business.-Here-Are-3-Ways-to-Protect-Yourself-1536x864.jpg 1536w, https:\/\/www.andysowards.com\/blog\/assets\/This-Type-of-Cyberattack-Could-Seriously-Hurt-Your-Small-Business.-Here-Are-3-Ways-to-Protect-Yourself.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/a><figcaption>This Type of Cyberattack Could Seriously Hurt Your Small Business. Here Are 3 Ways to Protect Yourself<\/figcaption><\/figure>\n\n\n\n<p>One of the biggest recent&nbsp;cybercrime trends, ransom DDoS (RDDoS) attacks add a new wrinkle to the familiar exploit. They occur when cyberattackers try to extort money from individuals or organizations by threatening to launch a&nbsp;DDoS attack.&nbsp;\u201cPay up, or we\u2019ll shut you down!\u201d is the message.&nbsp;<\/p>\n\n\n\n<p>There are variations on this theme. In some scenarios, attackers flood a target organization\u2019s website with useless signals and demand ransom to shut off the attack. Or RDDoS attacks can be a stand-alone exploit that provides a diversion from the attacker\u2019s real agenda, such as a data breach.<\/p>\n\n\n\n<p>RDDoS attacks expand the power and variety of malicious exploits. Vulnerable to an even wider range of attack methods, target organizations must be able to find and neutralize these complex exploits. It all adds up to more time and costs siphoned away from higher-value security activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DDoS attacks: More muscle in each exploit<\/strong><\/h2>\n\n\n\n<p>In the past six months or so, DDoS attack size remained relatively flat (that is, no massive Tbps-level attacks were observed). However, attackers continue to engage in faster, more difficult-to-mitigate attacks marked by:<\/p>\n\n\n\n<ul><li><strong>More attacks. <\/strong>During the past few years,<strong> <\/strong>DDoS attacks have <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/ddos-statistics-facts\/\" target=\"_blank\" rel=\"noreferrer noopener\">steadily increased<\/a> in frequency. In 1Q 2021, malicious actors launched approximately 2.9 million DDoS attacks, a 31-percent increase compared to the same time in 2020.\u00a0<\/li><\/ul>\n\n\n\n<ul><li><strong>More powerful attacks. <\/strong>Attack throughput increased by 71 percent compared with 1Q 2020.&nbsp;<\/li><li><strong>Shorter attacks. <\/strong>More attacks last from five to ten minutes, a relatively short time to do damage. Attackers get in, clog the target network\u2019s infrastructure, and get out. This tactic makes it more difficult for target SecOps teams to discover and neutralize attack agents.<\/li><li><strong>Continued focus on core industries. <\/strong>Attack activity in 2021 continues the pattern of targeting lifeline sectors during the pandemic. E-commerce, healthcare, and online learning organizations experienced higher activity from cyberattackers in 2020. Numbers gathered since the beginning of this year indicate that little has changed.&nbsp;<\/li><\/ul>\n\n\n\n<p>Some things don\u2019t change. IT operations still take it on the chin in the form of network downtime, low bandwidth, or slow network speeds. Post-attack IT effects often include lengthy, expensive recovery tasks such as adding or replacing security-related assets. DDoS attacks also deliver big business impacts, measured in terms of employee productivity, customer satisfaction and loyalty, damage to company reputations, and boatloads of recovery costs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protecting Against DDoS Threats<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2017\/03\/07\/7-security-steps-to-defend-your-company-from-a-ddos-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"960\" height=\"640\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/7-Security-Steps-To-Defend-Your-Company-From-A-DDoS-Attack.jpg\" alt=\"\" class=\"wp-image-42304 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/7-Security-Steps-To-Defend-Your-Company-From-A-DDoS-Attack.jpg 960w, https:\/\/www.andysowards.com\/blog\/assets\/7-Security-Steps-To-Defend-Your-Company-From-A-DDoS-Attack-768x512.jpg 768w\" data-sizes=\"(max-width: 960px) 100vw, 960px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 960px; --smush-placeholder-aspect-ratio: 960\/640;\" \/><\/a><figcaption>7 Security Steps To Defend Your Company From A DDoS Attack<\/figcaption><\/figure>\n\n\n\n<p>It\u2019s not all bad news, however. Advanced DDoS solutions can beat back attacks with a combination of data monitoring, scrubbing, and other analysis methods. Ideally, the most effective solutions:<\/p>\n\n\n\n<ul><li><strong>Apply DDoS protection<\/strong>&nbsp;outside the network, so the only traffic that reaches your hosts is filtered.&nbsp;<\/li><li><strong>Include a constantly updated knowledge base<\/strong> of DDoS threats as well as new and emerging attack methods.&nbsp;<\/li><li><strong>Identify emerging threats<\/strong> as they become public, detect known malicious actors, and apply remedies in real time.&nbsp;<\/li><\/ul>\n\n\n\n<p>Attack solutions are not a one-size-fits-all business, however. Each of the three types of DDoS attack has its own path to prevention and mitigation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Volume-Based DDoS Attacks&nbsp;<\/strong><\/h2>\n\n\n\n<p>In this, the most common type of DDoS exploit, attackers infect and control as many internet-connected devices as possible to overwhelm a website. Advanced solutions neutralize these threats by gathering DDoS traffic and rerouting it to a network of centralized scrubbing centers, where malicious traffic is analyzed and removed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protocol DDoS Attacks<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.wired.com\/story\/ddos-for-hire-fueling-new-wave-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"683\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks-1024x683.jpg\" alt=\"\" class=\"wp-image-42302 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks-1024x683.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks-768x512.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks-1536x1024.jpg 1536w, https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks-2048x1365.jpg 2048w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/683;\" \/><\/a><figcaption>\u2018DDoS-For-Hire\u2019 Is Fueling a New Wave of Attacks<\/figcaption><\/figure>\n\n\n\n<p>These attacks seek and exploit weakness in the internet communications procedures that run websites. Malicious actors use a computer to attack and overwhelm services that handle communications requests. Solutions use detailed monitoring of website traffic to find and compare traffic streams with expected standards. The software identifies infected traffic and blocks it before it reaches the website.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Application Layer DDoS Attacks<\/strong><\/h2>\n\n\n\n<p>In this type of attack, malicious actors search for weaknesses in applications used in the application layer of a web site.&nbsp; When a vulnerability is found, attackers generate so many bogus requests that the application cannot deliver content to users. Solutions use AI, machine learning, and data analytics to compare site traffic to known and new patterns of malicious behavior, block known bots, and challenge suspicious traffic with different security tools.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS attacks and extortion threats, become a<\/p>\n","protected":false},"author":1,"featured_media":42302,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,199,1],"tags":[5861,14630,13622,5891,6557,11174,5895,425,14629,7203,4371,14628,177,10795,5879],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DDoS Update: Something Old, Something New<\/title>\n<meta name=\"description\" content=\"Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Update: Something Old, Something New\" \/>\n<meta property=\"og:description\" content=\"Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-27T19:41:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-27T19:41:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/\",\"name\":\"DDoS Update: Something Old, Something New\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg\",\"datePublished\":\"2021-08-27T19:41:25+00:00\",\"dateModified\":\"2021-08-27T19:41:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg\",\"width\":2400,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS Update: Something Old, Something New\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS Update: Something Old, Something New","description":"Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/","og_locale":"en_US","og_type":"article","og_title":"DDoS Update: Something Old, Something New","og_description":"Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS","og_url":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2021-08-27T19:41:25+00:00","article_modified_time":"2021-08-27T19:41:27+00:00","og_image":[{"width":2400,"height":1600,"url":"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/","url":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/","name":"DDoS Update: Something Old, Something New","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg","datePublished":"2021-08-27T19:41:25+00:00","dateModified":"2021-08-27T19:41:27+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Distributed denial of service (DDoS) attacks are in the news again. Long-term DDoS trends continue their upward spiral, and RDDoS, a mashup of DDoS","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/\u2018DDoS-For-Hire\u2019-Is-Fueling-a-New-Wave-of-Attacks.jpg","width":2400,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2021\/ddos-update-something-old-something-new\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DDoS Update: Something Old, Something New"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/42300"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=42300"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/42300\/revisions"}],"predecessor-version":[{"id":42305,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/42300\/revisions\/42305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/42302"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=42300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=42300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=42300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}