Distributed Denial of Service (DDoS) Attack

Distributed Denial of Service (DDoS) Attack

DDoS attacks are among the most common forms of cyberattack. They often make use of networks (botnets) of devices (bots) that have been compromised by malware — placing them under the control of the bad actor. 

The attacker instructs every bot to send huge numbers of requests to the target, with the intention of overwhelming the network. At this point, normal service is denied to legitimate traffic... hence the name.

Crypto exchanges have become common targets for DDoS attacks. This isn't surprising, as bad actors tend to focus on high-profile businesses, and rising awareness of cryptocurrencies has put exchanges firmly in the spotlight.

Early in 2020, two major crypto exchanges were taken offline by DDoS attacks in the space of 24 hours. For exchanges, the risks are obvious: successful DDoS attacks mean that users cannot transact until they are brought back online.

The high number of successful DDoS attacks on crypto exchanges and other crypto sites is indicative of a more significant problem. In order to achieve mass adoption, cryptocurrencies need to be trustworthy. Consumers need to know that they will be able to access their funds and transact with the same ease and reassurance that they feel when using a bank. If exchanges and similar sites have fallen victim to DDoS attacks, consumers may reasonably be concerned about the stability of the cryptocurrency industry as a whole.
    • Related Articles

    • Denial-of-Service (DoS) Attack

      A denial-of-service attack restricts access to a computer or network in order to prevent intended users from using it. DoS attacks have become one of the go-to tools hackers employ in order to disturb the normal operation of computer-based services. ...
    • DDoS Attacks

      A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic to a web property. In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource ...
    • Distributed Network

      In a distributed network, data, computing tasks, and applications are spread across several (often many) machines, which communicate with and depend on each other. Distributed networks are established with the intention of spreading out work and ...
    • Cryptoasset

      Cryptoassets leverage cryptography, consensus algorithms, distributed ledgers, peer-to-peer technology and/or smart contracts to function as a store of value, medium of exchange, unit of account, or decentralized application (DApp). There are four ...
    • Crypto Invoicing

      Crypto invoicing allows you to create different itemized bills and invoices for the products or services you offer. It enables you to bill clients in crypto via email, without the hassle of switching between wallets and apps. As cryptocurrencies ...