For many organizations situated at the receiving-end of a coordinated DDoS attack, the objectives of the attackers may not necessarily be self-evident. In too many cases, organizations come under the cross-hairs of multiple DDoS campaigns – with the campaigns being launched and orchestrated by different groups.
From an instigators perspective, some of the most common DDoS objectives are:
Extortion. The attackers seek to cause key online business services to become unavailable at critical times and expect payment for an attack to cease. For example:
Espionage. The attackers seek to cause key business services to become unavailable or unresponsive while reaping an award on another front. The DDoS attack itself is used as a method of disguising the real purpose of the attack or distracting the victim’s attention. For example:
Protesting. The attackers seek attention to the particular cause or public issue they are pursuing and work to force a particular change in policy or behavior. Attack participants are provided with target and coordination details from a central “authority”. For example:
Nuisance. The attackers launch attacks against a broad spectrum of targets “because they can”. The objectives vary greatly between targets but the DDoS attacks are typically short lived, often reactionary to a perceived slight, or designed to gain some temporary advantage over named individuals. For example:
Source: Damballa Study