The disruptions experienced in early June were DDoS attacks by a hacker group, Storm-1359, which could be linked to Russia. Microsoft has confirmed that recent outages to its popular services, including Outlook, Teams, OneDrive, and cloud computing platform Azure, were caused by a DDoS attack by a threat actor that the company tracks as Storm-1359. Also known as Anonymous Sudan, Storm-1359 was first detected in January, targeting organizations and government agencies with DDoS attacks and efforts to exfiltrate data. The threat actor was initially assumed to be a “hacktivist” group protesting a controversial outfit at the Melbourne Fashion Week but has since been linked to the Russian state, according to several media reports. “Microsoft assessed that Storm-1359 has access to a collection of botnets and tools that could enable the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures,” the company said in a blog post. “Storm-1359 appears to be focused on disruption and publicity.” The recent DDoS activities by Storm-1359, Microsoft said, targeted the application layer (layer 7) of the network stack, rather than the most frequently targeted layers 3 or 4. Different types of layer 7 DDoS attacks Storm-1359 was observed launching several types of layer 7 DDoS attack traffic, including HTTP(S) flood attack, Cache bypass, and Slowloris. An HTTP(S) flood attack floods the target system with a large number of distributed HTTP(S) requests and SSL/TLS handshakes. The goal is to exhaust the application backend’s CPU and memory resources, causing it to become overwhelmed and unresponsive. Cache bypass attacks, on the other hand, are aimed to bypass the content delivery network (CDN) layer and overwhelm the origin servers. By sending specific queries with generated URLs, the attacker forces all requests to be forwarded to the origin servers instead of utilizing cached content. In a Slowloris attack, the client requests a resource from a web server but deliberately delays or fails to acknowledge the download. This forces the web server to keep the connection open and hold the requested resource in memory. Microsoft’s recommendations include effective WAF settings The most effective way to reduce the impact of the layer 7 DDoS attack is to install a layer 7 web application firewall (WAF) protection service, Microsoft said. Azure WAF, available with Azure Front Door and Azure Application Gateway, can be used to protect web applications, with a mix of adequate settings, it said. The recommended settings include configuring bot protection for known bad bots, identifying, and blocking malicious IP addresses and HTTPS attacks with custom WAF rules, and limiting traffic from a defined geographic region. Related content feature 8 AI-powered apps that'll actually save you time Most AI apps are buzzword-chasing hype-mongers. These eight off-the-beaten-path supertools are rare exceptions. By JR Raphael Jul 01, 2024 15 mins Generative AI Productivity Software news analysis EU commissioner slams Apple Intelligence delay Margrethe Vestager, Europe's chief gatekeeper, takes a shot at Apple's decision to delay rolling out the company's AI. By Jonny Evans Jun 28, 2024 7 mins Regulation Apple Generative AI how-to Download our unified communications as a service (UCaaS) enterprise buyer’s guide Does your phone system date back to the last century? If so, you’re missing out on new technologies that can increase productivity and support a more distributed workforce. That’s where unified communications as a service, or UCaaS, comes By Andy Patrizio Jun 28, 2024 1 min Unified Communications Enterprise Buyer’s Guides Cloud Computing feature Enterprise buyer’s guide: Android smartphones for business Security is the biggest — but not only — factor when deciding what Android devices to support in your enterprise. See how Google, Honor, Huawei, Infinix, Itel, Motorola, Nokia, OnePlus, Oppo, Realme, Samsung, Tecno, Vivo, and Xiaomi stack By Galen Gruman Jun 28, 2024 23 mins Google Samsung Electronics Smartphones Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe