24/7 Service, Same Day Diagnostics

What's Trending

Subscribe me
* This field is required
Our Latest Tweets

Mobile security: Devices may be used in future DDoS attacks

According to a recently released report, opt-in mobile DDoS apps will become an increasing threat to businesses in 2014.


According to Prolexic Technologies, an American based DDoS protection firm, Distributed Denial of Service (DDoS) attacks originating from mobile devices may increase against businesses. Prolexic Technologies released data from its fourth quarter 2013 report that points to mobile applications continuing to play a more expansive role in attacks on businesses.

The Prolexic Technologies Q4 2013 report

The Prolexic Technologies 2013 report (link) gathered data from attacks against their clients and showed that a firm fell victim to such an attack. AnDOSid, an Android app capable of mounting an HTTP POST flood attack, was detected using advanced digital and attack signature analysis. Prolexic has described the increase of these attacks as game changing and blames the availability of easily downloaded apps that allow users to join DDoS campaigns for the increase. The company expects to see a rise in mobile app-based DDoS campaigns in 2014.

The Prolexic Technologies Q4 2013 report showed that there was a 26 percent increase in DDoS attacks against their clients in Q4 from the preceding year. The most significant DDoS attack that Prolexic Technologies was able to combat peaked at nearly 179 Gbps, while the primary target of nearly 76 percent of all attacks was aimed at infrastructure systems.

Stuart Scholly, president of Prolexic Technologies, said he believes that applications commonly used in DDoS attacks will increasingly be ported to mobile platforms in the coming year, "With mobile apps, malicious actors can choose to proactively participate in orchestrated DDoS attack campaigns. When you consider how many mobiles device users there are in the world, this presents a significant DDoS threat."

Scholly also indicated that mobile devices added another level of complexity to the problems faced when attempting to combat these attacks. The use of super proxies by mobile networks along with the difficulties in blocking source IP addresses without impeding legitimate traffic compound the issue.

Share your opinion:

Request Help
Call for Immediate Assistance
24 Hour Service Expert Hotline
Alternatively, you can also fill out
a request help form online
Submit Help Request
Article Search
Secured & Certified


We are