Main / FAQ

FAQ

This section contains answers to frequently asked questions. If you have not found an answer to your question, you can send it to our e-mail address info@kz-cert.kz.

Why is a foreign Internet resource blocked/inaccessible?

If you have faced the problem of unavailability of an Internet resource, it is most likely that the Internet resource contains forms for collecting personal data or malware. Therefore, you should contact a competent authority.

What to do if your card has been charged:

  • block the card;
  • contact the banks technical support;
  • apply to the Ministry of Internal Affairs of the Republic of Kazakhstan.

What to do if you received a call from fraudsters/ SMS from the bank reply:

  • do not pass personal data to strangers;
  • contact the banks technical support;
  • apply with a claim to the Ministry of Internal Affairs of the Republic of Kazakhstan.

The activity of my .kz site is suspended

  • Contact KAZnic (nic.kz)
  • Contact the competent authority in the field of information security Ministry of Digital Development, Innovations and Aerospace Industry of the Rpublic of Kazakhstan (mdai.gov.kz).

If malicious activity/compromising data/hacking and content modification/phishing forms/Botnet was detected on your Internet resource or information system.

  • Fill out an application under "report the incident"
  • Contact the hotline "1400"

How a DDoS attack works

Network resources, such as web servers, have limits on the number of requests they can serve at a time. In addition to the allowable load on the server, there are also limits on the bandwidth that connects the server to the Internet. When the number of requests exceeds the performance of any infrastructure component, the following can happen:

  • Denial of service for all or part of user requests.
  • As a rule, the cybercriminals ultimate goal is to completely shut down the web resource - "denial of service".

For what purposes are DDoS attacks used?

As a rule, the ultimate goal of an attacker is a complete shutdown of a web resource - a "denial of service". An attacker may demand money for stopping the attack, and in some cases a DDoS attack may be an attempt to discredit or destroy a competitor's business.

  • A significant slowdown in the response time to requests.
  • Denial of service for all or part of user requests. As a rule, the ultimate goal of an attacker is a complete shutdown of a web resource - a "denial of service". An attacker can also demand money for stopping the attack. In some cases, a DDoS attack may be an attempt to discredit or destroy a competitor's business.

Why is a DDoS attack used?

An example: The St. Valentines Day is coming up and flower vendors are in great demand. An ambitious entrepreneur opens an online flower shop with the following features: beautiful design, good variety of products, fast delivery and a solid budget for advertising. The only problem is very strong competitors who have been on the market for some time and who will take a significant share of the market. The thing that a small entrepreneur can risk taking responsibility for all the negative consequences is to attack competing websites and disable them for a few days or at least hours.

Who is involved in the DDoS attack?

Suppose that the owner of a new online flower shop found a potential "hacker" to carry out the attack, using their personal connections. They set a price for their services, which also depends on the complexity of the attack. In fact, the "bad guy" has a database of infected PCs around the world, whose users unconsciously using various suspicious links, running unknown files or installing malicious programs. All these viruses only become known when the bad guy activates and controls the infected computers. Such a network is called a botnet.

An example: The St. Valentines Day is coming up and flower vendors are in great demand. An ambitious entrepreneur opens an online flower shop with the following features: beautiful design, good variety of products, fast delivery and a solid budget for advertising. The only problem is very strong competitors who have been on the market for some time and who will take a significant share of the market. The thing that a small entrepreneur can risk taking responsibility for all the negative consequences is to attack competing websites and disable them for a few days or at least hours.

What happens when you launch a DDoS attack?

The attack is launched through the Internet. Given the network bandwidth, the attack will not cause channel saturation. The attack comes to the server and is processed. At the same time, traffic detector analysis will determine if this is a growing attack and therefore initiates the process of defusing it.

Who is involved in the DDoS attack?

Suppose that the owner of a new online flower shop found a potential "hacker" to carry out the attack, using their personal connections. They set a price for their services, which also depends on the complexity of the attack. In fact, the "bad guy" has a database of infected PCs around the world, whose users unconsciously using various suspicious links, running unknown files or installing malicious programs. All these viruses only become known when the bad guy activates and controls the infected computers. Such a network is called a botnet.

How do I determine if my device is part of a botnet?

Usually a bot in a botnet is a device with malware that allows an attacker to perform certain actions using the resources of an infected computer. The following factors may indicate that your personal computer is part of a botnet:

  • Programs can run or connect to the Internet without your participation;
  • Applications are not running;
  • Messages that you didn't send come to your friends via email or messenger;
  • The computer is running slowly or freezes frequently;
  • Files and folders may disappear or their contents may change;
  • A lot of system error messages pop up;
  • The browser freezes or behaves in an unexpected way. For example, you can't close a tab

I have no antivirus software installed on my workstation, does it make sense to install licensed antivirus software?

The trend of cyber threats and the increase in the number of malware and bots in botnets suggests that without antivirus software, your device is at risk.

Why do vulnerabilities appear on an Internet resource?

  • Because of incorrectly written web application code;
  • Lack of updates of the software and operating systems used;
  • Disadvantages of password policy;
  • Incorrect configuration of the web server;
  • Uncontrolled increase in the number of services available from the Internet.

Why do vulnerabilities appear on an Internet resource?

  • Because of incorrectly written web application code;
  • Lack of updates of the software and operating systems used;
  • Disadvantages of password policy;
  • Incorrect configuration of the web server;
  • Uncontrolled increase in the number of services available from the Internet.