This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Denial-of-service attacks often used as a smokescreen for data theft

Share this article:
Denial-of-service attacks often used as a smokescreen for data theft
Denial-of-service attacks often used as a smokescreen for data theft

The concept of the ‘diverse, distributed denial-of-service' (3DoS) attack is the next threat for businesses that take their eye off the ball when a DoS attack occurs.

Speaking to SC Magazine, Nathan Pearce, EMEA product manager at F5 Networks, said that DoS attacks are often used as a smoke screen for attacks to take place and are used as a ‘distraction tactic'.

He said: “An attacker would use a DoS attack so the victim is looking at it and not the attack and they use it to steal data.

“The problem within security is we need to understand the differences between DoS and data theft as DoS is not hacking and the scope for isolating and putting solutions in to mitigate the attack.”

He went on to say that too many people think that DoS attacks are all the same, especially when it comes to data theft.

An example of this was when in 2010 legal firm ACS:Law was hit by a DoS attack that left the unencrypted personal details of more than 5,300 BSkyB broadband subscribers accessible.

Darren Anstee, solutions architect global team manager for Arbor Networks, confirmed that DoS attacks are often used as "a disguise for other things", and often that a victim could not see everything that is going on because they are dealing with the denial flood.

He told SC Magazine that this was the case with the Sony attacks in 2011, where DoS attacks were used to disguise data thefts, and often this is done by mixing tools together, such as a DoS or an advanced persistent threat.

“These are all tools that the cyber criminal wants to use to do something and they can combine them in different ways and they are more adept and they are great at cloaking,” Anstee said.

“DoS is more complex and sophisticated and there is a lot you cannot deal with. As DoS [attacks] have increased and changed, it has become about how to mitigate attacks and traffic and about what you can do while an attack is taking place.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

NCA wants security pros to become cybercrime fighters

NCA wants security pros to become cybercrime fighters

The UK's National Crime Agency is on the hunt for cyber security professionals to "join the fight against some of the world's most significant cyber criminals" on salaries ranging from ...

GCHQ head says agency was 'never involved in mass surveillance'

GCHQ head says agency was 'never involved in ...

Sir Iain Lobban says GCHQ staff "are normal decent human beings who watch EastEnders and Spooks".

Apple Mac OS criticised for sending search results to third parties

Apple Mac OS criticised for sending search results ...

Apple is under pressure to make changes to the Spotlight feature on the new Mac OS X Yosemite 10.10, which tracks location and sends data back to the firm and ...