May 17, 2017 · For a DDoS attack to be successful, an attacker will spread malicious software to vulnerable computers, mainly through infected emails and attachments. This will create a network of infected machines which is called a botnet. The ‘monlist’ command is not the only one with a significant amplification factor, others can be abused as well to produce attacks. There are millions of services on the Internet that attackers can abuse, but they all can be secured to avoid participation in DDoS attacks.
A distributed denial of service (DDoS) attack is a brute-force attempt to slow down or completely crash a server. Although still a serious threat to businesses, increasing corporate awareness coupled with Internet security software enhancements has helped reduce the sheer number of attacks.