{"id":19339,"date":"2024-12-19T06:42:07","date_gmt":"2024-12-19T06:42:07","guid":{"rendered":"https:\/\/popularreads.co\/ddos-attacks-on-indian-infrastructure-grew-by-50-in-2024-positive-technologies\/"},"modified":"2024-12-19T06:42:07","modified_gmt":"2024-12-19T06:42:07","slug":"ddos-attacks-on-indian-infrastructure-grew-by-50-in-2024-positive-technologies","status":"publish","type":"post","link":"https:\/\/popularreads.co\/?p=19339","title":{"rendered":"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies"},"content":{"rendered":"<div class='booster-block booster-read-block'>\n                <div class=\"twp-read-time\">\n                \t<i class=\"booster-icon twp-clock\"><\/i> <span>Read Time:<\/span>4 Minute, 56 Second                <\/div>\n\n            <\/div>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>All India, December 19, 2024<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">: The number of distributed denial-of-service (DDoS) attacks on Indian infrastructure has\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>increased by 50% since the beginning of<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\"> 2024,\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>finds a study by Positive Technologies<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">Positive Technologies, a leader in result-driven cybersecurity, has<\/span><\/span><a style=\"text-decoration:none\" href=\"https:\/\/global.ptsecurity.com\/analytics\/a-look-at-india-through-the-dark-web-what-hackers-are-after\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">\u00a0<\/span><\/span><span style=\"background-color:transparent;color:#1155cc;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;vertical-align:baseline\"><u>presented<\/u><\/span><\/span><\/a><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\"> a study* of dark web platforms and cybercrime services, offering detailed data on the nature of cyberattacks in India. The study found that the attackers are primarily interested in databases and access to the infrastructure of various organizations. For example, the Indian Space Research Organization alone has to fend off more than 100 hacker attacks every day.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">India&#8217;s rapid digital development, which has made the country the world&#8217;s third-largest digital economy in 2024, creates a favorable environment for cyberattacks. Ever-evolving digital tools have transformed multiple sectors and fueled entrepreneurship, but they also attract malicious actors seeking to exploit the weaknesses of the digital infrastructure.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">The study found that cybercriminals are primarily interested in\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>databases and access to key infrastructure platforms of various Indian companies across industries<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">. Overall,\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>85%\u00a0<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">of the DDoS attacks in Indian cyberspace\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>target the financial sector<\/strong><\/span><\/span><span style=\"background-color:transparent;color:#000000;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">,<\/span><\/span><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\"> while the remaining\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>15% target government agencies<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">.\u00a0<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>India is among the top three countries in terms of the number of dark web ads related to leaked and stolen databases<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">. Positive Technologies has confirmed that databases are of the greatest interest to cybercriminals targeting the country&#8217;s infrastructure. This is the most popular dark web topic for India:\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>database-related ads account for 42% of all posts<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">. Additionally,\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>more than half of the databases (66%) are being distributed for free: experts attribute this to the activity of hacktivists and ransomware groups in the region<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">. In most cases, hackers gained access to data from scientific and educational institutions, financial organizations, government agencies, and commercial companies.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">According to the study<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>, the majority of stolen data (61%) is personally identifiable information of companies&#8217; customers and employees<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">. A cyberattack on just one major Indian electronics manufacturer in April 2024 resulted in the theft of 7.5 million customer records. As for the most common cyberattack tool, 23% of successful attacks were carried out by using ransomware, according to hacker groups.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">&#8220;Our analysis of dark web markets offering cybercrime services shows that only 29% of hacked databases are then sold.\u00a0 Sellers frequently offer databases of financial organizations, service companies, and retail businesses. In 40% of the ads, the price does not exceed $1,000 per database. Buyers&#8217; ads account for only 5% of the region&#8217;s dark web and indicate the most common areas of interest for cybercriminals, one of them being financial data,&#8221; said\u00a0<\/span><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>Ms. Anastasia Chursina, Analyst at Positive Technologies<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">Access credentials are the second most popular cybercrime service, accounting for 23% of posts on dark web forums. Unlike databases, which are distributed mostly for free, credentials are often sold, granting access to the IT infrastructure of commercial, financial, and service companies. According to the study, more than 60% of all access credentials can be bought for less than $ 1,000, but sellers charge more for access to financial organizations.\u00a0<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">For example, access credentials for an Indian bank, with administrator privileges and the ability to connect to internal portals and servers connected to ATMs and mobile applications, are offered for $70,000 and more.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>Experts at Positive Technologies highlight the need for the region to address the significant number of dark web offers related to databases and credentials that grant access to corporate IT infrastructures. The low price of access credentials and free-of-charge distribution of personal data may contribute to an increase in cyberattacks targeting companies and government agencies in the country. The experts recommend that organizations establish comprehensive protection based on the principles of result-driven cybersecurity.<\/strong><\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>A competent approach to security event analysis calls for a combination of SIEM and XDR solutions. MaxPatrol O2, a cybersecurity metaproduct, will be of great help in effective monitoring and detection of threats within a corporate IT infrastructure.<\/strong><\/span><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\"> The cybersecurity system should also include modern tools such as a next-generation firewall (NGFW), web application firewall (WAF), network traffic analysis (NTA) tool, and the MaxPatrol VM vulnerability management system.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">The combination of SIEM and XDR solutions enhances an organization&#8217;s threat management capabilities by consolidating and analyzing security data from various sources, and facilitates a centralized response. Given the nature of cyberattacks in India, sandboxes should not be neglected as well: they allow for timely detection of various types of malware, including ransomware.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>*The Positive Technologies study analyzes dark web messages related to India in the period between September 1, 2023 and October 1, 2024. The sample includes 380 Telegram channels and forums on the dark web, with an audience of about 65 million users and the total number of messages approaching 250 million.<\/strong><\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">The entire research is published on:<\/span><\/span><a style=\"text-decoration:none\" href=\"https:\/\/global.ptsecurity.com\/analytics\/a-look-at-india-through-the-dark-web-what-hackers-are-after\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">\u00a0<\/span><\/span><span style=\"background-color:transparent;color:#0070c0;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;vertical-align:baseline\"><u>https:\/\/global.ptsecurity.com\/analytics\/a-look-at-india-through-the-dark-web-what-hackers-are-after<\/u><\/span><\/span><\/a><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\"><strong>About Positive Technologies<\/strong><\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">Positive Technologies is an industry leader in results-oriented cybersecurity and a major global provider of information security solutions. Its mission is to safeguard businesses and entire industries against cyberattacks and non-tolerable damage. Over 4,000 organizations worldwide use technologies and services developed by our company.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">Positive Technologies is the first and only cybersecurity company in Russia to have gone public on the Moscow Exchange (MOEX: POSI), with 205,000 shareholders and counting.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">Positive Technologies is known globally as a visionary and a leader in the field of ethical security research. Each year its experts identify hundreds of zero-day vulnerabilities in IT systems of various classes and types, including products by Cisco, Citrix, IBM, Intel, Microsoft, and VMware. For detecting dangerous vulnerabilities, the company\u2019s experts have been added to the halls of fame of such companies as Adobe, Apple, AT&amp;T, GitLab, Google, IBM, Mastercard, Microsoft, PayPal, VK, and Yandex.<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><span style=\"background-color:transparent;color:#313131;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;text-decoration:none;vertical-align:baseline\">For more information on the company, click on this link:<\/span><\/span><\/p>\n<p style=\"line-height:1.2;margin-bottom:12pt;margin-top:0pt\" dir=\"ltr\"><a style=\"text-decoration:none\" href=\"https:\/\/pt-global.storage.yandexcloud.net\/PT_about_560732563c.pdf\"><span style=\"background-color:transparent;color:#0070c0;font-family:Calibri, sans-serif;font-size:11pt\"><span style=\"font-style:normal;font-variant:normal;font-weight:400;vertical-align:baseline\"><u>https:\/\/pt-global.storage.yandexcloud.net\/PT_about_560732563c.pdf<\/u><\/span><\/span><\/a><\/p>\n        <div class=\"booster-block booster-reactions-block\">\n            <div class=\"twp-reactions-icons\">\n                \n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-1\" post-id=\"19339\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/happy.svg\" alt=\"Happy\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Happy                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                        \n                                                <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-2\" post-id=\"19339\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/sad.svg\" alt=\"Sad\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Sad                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-3\" post-id=\"19339\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/excited.svg\" alt=\"Excited\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Excited                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-6\" post-id=\"19339\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/sleepy.svg\" alt=\"Sleepy\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Sleepy                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                        \n                                                <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-4\" post-id=\"19339\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/angry.svg\" alt=\"Angry\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">Angry<\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                        \n                    <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-5\" post-id=\"19339\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/surprise.svg\" alt=\"Surprise\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">Surprise<\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n            <\/div>\n        <\/div>\n\n    ","protected":false},"excerpt":{"rendered":"<p>All India, December 19, 2024: The number of distributed denial-of-service (DDoS) attacks on Indian infrastructure has\u00a0increased by 50% since the beginning of 2024,\u00a0finds a study by Positive Technologies. Positive Technologies, a leader in result-driven cybersecurity, has\u00a0presented a study* of dark web platforms and cybercrime services, offering detailed data on the nature of cyberattacks in India. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[66],"tags":[],"class_list":["post-19339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agency-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/popularreads.co\/?p=19339\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies\" \/>\n<meta property=\"og:description\" content=\"All India, December 19, 2024: The number of distributed denial-of-service (DDoS) attacks on Indian infrastructure has\u00a0increased by 50% since the beginning of 2024,\u00a0finds a study by Positive Technologies. Positive Technologies, a leader in result-driven cybersecurity, has\u00a0presented a study* of dark web platforms and cybercrime services, offering detailed data on the nature of cyberattacks in India. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/popularreads.co\/?p=19339\" \/>\n<meta property=\"og:site_name\" content=\"Popular Reads\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-19T06:42:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/12\/173459052891411984948.1734590468993_content_img.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1430\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/person\\\/9e92abcc10fa4f78227517a6782ef83c\"},\"headline\":\"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies\",\"datePublished\":\"2024-12-19T06:42:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339\"},\"wordCount\":943,\"publisher\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/173459052891411984948.1734590468993_content_img.png\",\"articleSection\":[\"Agency News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339\",\"url\":\"https:\\\/\\\/popularreads.co\\\/?p=19339\",\"name\":\"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/173459052891411984948.1734590468993_content_img.png\",\"datePublished\":\"2024-12-19T06:42:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/popularreads.co\\\/?p=19339\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#primaryimage\",\"url\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/173459052891411984948.1734590468993_content_img.png\",\"contentUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/173459052891411984948.1734590468993_content_img.png\",\"width\":1430,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=19339#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/popularreads.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#website\",\"url\":\"https:\\\/\\\/popularreads.co\\\/\",\"name\":\"Popular Reads\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/popularreads.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#organization\",\"name\":\"Popular Reads\",\"url\":\"https:\\\/\\\/popularreads.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Popular-Reads_Logo_Design-300.png\",\"contentUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Popular-Reads_Logo_Design-300.png\",\"width\":300,\"height\":80,\"caption\":\"Popular Reads\"},\"image\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/person\\\/9e92abcc10fa4f78227517a6782ef83c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/popularreads.co\"],\"url\":\"https:\\\/\\\/popularreads.co\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/popularreads.co\/?p=19339","og_locale":"en_US","og_type":"article","og_title":"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies","og_description":"All India, December 19, 2024: The number of distributed denial-of-service (DDoS) attacks on Indian infrastructure has\u00a0increased by 50% since the beginning of 2024,\u00a0finds a study by Positive Technologies. Positive Technologies, a leader in result-driven cybersecurity, has\u00a0presented a study* of dark web platforms and cybercrime services, offering detailed data on the nature of cyberattacks in India. [&hellip;]","og_url":"https:\/\/popularreads.co\/?p=19339","og_site_name":"Popular Reads","article_published_time":"2024-12-19T06:42:07+00:00","og_image":[{"width":1430,"height":635,"url":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/12\/173459052891411984948.1734590468993_content_img.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/popularreads.co\/?p=19339#article","isPartOf":{"@id":"https:\/\/popularreads.co\/?p=19339"},"author":{"name":"admin","@id":"https:\/\/popularreads.co\/#\/schema\/person\/9e92abcc10fa4f78227517a6782ef83c"},"headline":"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies","datePublished":"2024-12-19T06:42:07+00:00","mainEntityOfPage":{"@id":"https:\/\/popularreads.co\/?p=19339"},"wordCount":943,"publisher":{"@id":"https:\/\/popularreads.co\/#organization"},"image":{"@id":"https:\/\/popularreads.co\/?p=19339#primaryimage"},"thumbnailUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/12\/173459052891411984948.1734590468993_content_img.png","articleSection":["Agency News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/popularreads.co\/?p=19339","url":"https:\/\/popularreads.co\/?p=19339","name":"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies","isPartOf":{"@id":"https:\/\/popularreads.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/popularreads.co\/?p=19339#primaryimage"},"image":{"@id":"https:\/\/popularreads.co\/?p=19339#primaryimage"},"thumbnailUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/12\/173459052891411984948.1734590468993_content_img.png","datePublished":"2024-12-19T06:42:07+00:00","breadcrumb":{"@id":"https:\/\/popularreads.co\/?p=19339#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/popularreads.co\/?p=19339"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/popularreads.co\/?p=19339#primaryimage","url":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/12\/173459052891411984948.1734590468993_content_img.png","contentUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/12\/173459052891411984948.1734590468993_content_img.png","width":1430,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/popularreads.co\/?p=19339#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/popularreads.co\/"},{"@type":"ListItem","position":2,"name":"DDoS attacks on Indian Infrastructure Grew by 50% in 2024: Positive Technologies"}]},{"@type":"WebSite","@id":"https:\/\/popularreads.co\/#website","url":"https:\/\/popularreads.co\/","name":"Popular Reads","description":"","publisher":{"@id":"https:\/\/popularreads.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/popularreads.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/popularreads.co\/#organization","name":"Popular Reads","url":"https:\/\/popularreads.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/popularreads.co\/#\/schema\/logo\/image\/","url":"https:\/\/popularreads.co\/wp-content\/uploads\/2022\/04\/Popular-Reads_Logo_Design-300.png","contentUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2022\/04\/Popular-Reads_Logo_Design-300.png","width":300,"height":80,"caption":"Popular Reads"},"image":{"@id":"https:\/\/popularreads.co\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/popularreads.co\/#\/schema\/person\/9e92abcc10fa4f78227517a6782ef83c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/popularreads.co"],"url":"https:\/\/popularreads.co\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/posts\/19339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19339"}],"version-history":[{"count":0,"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/posts\/19339\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/media\/19340"}],"wp:attachment":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}