What DDoS Attacks Really Cost?

DDoS Attack Cost

The average cost of a DDoS (denial of service) attack in 2023 was $486,000, but this varied depending on several factors. Attacks lasting 68 minutes resulted in an average cost of $408,000 for unprotected organizations, with each minute of downtime costing $6,000. 

But the cost for smaller businesses could be less than $100,000, while larger organizations could face financial losses exceeding $1 million.

Quick Takeaways

  • There are three common types of DDoS attacks, each with its own MO: Volumetric; protocol attacks; and application-layer. More recently, experienced attackers have taken to employing multi-vector attacks to better evade protection.
  • Cost (attacker): To purchase, DDoS attacks can cost as little as $7. More advanced campaigns can be paid for via prescription and hourly rates. 
  • Cost (victim): The average cost of a DDoS attack for the enterprise is close to $40,000 per hour. 

The 3 Types of DDoS Attacks

DDoS  can be segmented into three key types of attacks. 

Each demands that the attacker takes a different approach – and highly sophisticated attacks sometimes combine the different methods to try and circumvent the protection of a cybersecurity solution. 

Volumetric 

The favorite of many low-skilled attackers, volumetric DDoS attacks aim to capitalize on the scalable nature of internet resources. Apps that demand quick responses – such as audio and video streaming – often rely on extremely fast UDP connections. 

Within this, data is sent with no further confirmation that it’s been received.

The target server must also search for the relevant application when a packet arrives. This automated process means that, when a great deal of malicious traffic suddenly arrives at the IP address’ ports, the request processing mechanism can quickly begin to break down.

Key to this process is the sheer volume of individual requests: achieved via a botnet, these are often million-strong groups of infected WiFi-connected devices that can covertly be activated during an attack. Either rented or built from scratch, a botnet grants the horsepower to a volumetric attack’s engine – and its success demands overwhelming numbers. 

Protocol 

As we just discovered, different protocols determine the ways in which data is transferred: some DDoS attacks rely explicitly on snags in their unique approaches. The Transmission Control Protocol (TCP), for instance, sets up a three-way handshake before data is transmitted. 

Within this, the target device must wait on a final acknowledgement (ACK) packet. 

An attacker can abuse this by making a victim server wait for an ACK response that never comes – multiplied across tens of thousands of requests, this consumes bandwidth until almost no genuine TCP connections can be established.

Application 

Application layer attacks focus on the disparity between client and server resource allocation. For instance, HTTP requests are computationally cheap, whereas delivering on the multiple files and database queries that make up a webpage is far more expensive. 

This disparity is at the heart of the Slowloris application-layer attack, which sends partial HTTP requests to a targeted server to slowly drain resources from it.

The Economics of DDoS Attack Costs

Ordering a simple, small-scale DDoS attack can cost as little as $7: but the DDoS as a service market offers far wider-ranging and more expensive options. Some services allow for a customer to choose a specific attack scenario, and combine different forms of attack depending on the victim’s own circumstances. 

Considering one report from cybersecurity researcher Denis Makrushin, ongoing attacks can cost around $20 per hour to conduct, with the provider further offering bonus points and hours in their own version of a loyalty scheme.

When delving into DDoS providers’ profit margins, compare this with the price of virtual servers: Amazon EC2 servers with next-to-no-configuration cost less than $0.007 per hour. 50 of these for a simple attack against an eCommerce store would only cost the cybercriminals around $0.325 for each hour of active attack. 

Throw in some additional costs, like a burner SIM card to register the AWS account and a credit card to it, the hourly cost of performing a simple DDoS attack can be as low as $4.

The Financial Implications of DDoS Attacks for Businesses (Big and Small)

The motives behind DDoS attacks are varied, ranging from opportunistic business owners wanting a service disruptions to the competition’s services to hacktivists sending a message to organizations they disagree with. 

Each group has its own budget and access to the resources required, but average figures pin the cost of today’s DDoS attacks to around $40,000 per hour. This figure takes into account the loss of server and app performance from customer and employees, but note that further costs also rapidly accrue: 

if sensitive data is stolen or contractual obligations missed, the victim will face further punitive costs.

For larger organizations, attackers know that a slew of legal costs face the victim; which is why extortion is a natural next step for many attack campaigns. Understanding that the victim likely doesn’t want the attack to continue, an attacker will ask for a price – often a small amount below the predicted price of a few days’ outage. This makes a DDoS attack even more profitable for attackers, and contributes significantly to the average total cost of an attack, which in the US is currently around $218k

Prevent DDoS Attacks with Perimeter 81

Attack mitigation can take several forms, but Perimeter 81’s ZTNA solution secures your most critical internal resources and segments resource access by role, device, and behaviors. 

Get critical services off the public internet and away from opportunistic DDoS attackers, and better secure the ones that need to remain public-facing. By granting a single-pane-of-glass-view into your network’s behavior, it becomes possible to spot anomalies far faster. 

To see how Perimeter 81 achieves this, explore a demo today and take your first step toward network security.

FAQs

What are the common types of DDoS attacks?
Common types include volumetric attacks, protocol attacks, and application layer attacks. Volumetric attacks flood bandwidth, protocol attacks exploit network vulnerabilities, and application layer attacks target specific applications.
How can organizations detect DDoS attacks?
Organizations detect DDoS attacks by monitoring for unusual traffic spikes, traffic from unexpected sources, and specific types of requests flooding the network.
What immediate steps should be taken when a DDoS attack is detected?
Immediately activate your incident response plan, inform your ISP, and implement traffic filtering to block malicious traffic.
How can IP blocklisting help mitigate DDoS attacks?
IP blocklisting helps by preventing traffic from known malicious IP addresses, reducing the impact of the attack on the network.
What role does a zero trust model play in DDoS protection?
A zero trust model limits access to resources based on user identity and context, reducing the attack surface and containing potential damage from compromised accounts.

Get the latest from Perimeter 81