DDoS attacks are becoming more challenging than ever before. The attackers are now beefing up DDoS attacks with new attack vectors that include but are not limited to the abuse of Windows RDP and Plex Media servers.
While Ransom-related DDoS (RDoS) remains the front runner, tactics to launch other forms of DDoS attacks with an aim to disrupt services effectively have expanded rapidly. In this attempt, a previously forgotten DDoS attack method—Telephony Denial-of-Service (TDoS)—has emerged from the shadow.
TDoS aiming at emergency services
The FBI has warned that TDoS attacks are aiming at emergency dispatch centers, such as police, fire, or ambulance services.
The objective is to keep the distraction calls active for as long as possible, which may delay or block legitimate calls for services.
TDoS attacks can be manual or automated. In the case of manual, adversaries typically leverage social networks, such as Facebook and Twitter, to encourage individuals into a TDoS calling campaign.
An automated TDoS attack, on the other hand, makes use of VoIP software and Session Initiation Protocol (SIP) to make tens or hundreds of calls, simultaneously or in rapid succession.
One weapon, many motives
TDoS attacks can be used for hacktivism, financial gain, or harassment.
Attackers can use the attack method to extort victims for financial benefit.
Malicious actors may also use TDoS attacks to harass call centers and distract operators, regardless of harmful effects.
Just as the saying goes ‘prevention is better than cure’, individuals can/should be prepared for a TDoS attack. Similarly, emergency services must be well-equipped to maintain hassle-free services without any disruption from threat actors.