R34 — DDoS-Extortion / Layer-7 Abuse
Ransom-DDoS gangs (RDoS) and L7 application-floods that bypass volumetric scrubbing by mimicking real users. Prevention via WAF/DDoS provider + rate-limiting dominates; response speed determines downtime cost. Residual exists because bot-driven L7 traffic is hard to distinguish from a flash crowd.
What is DDoS-Extortion / Layer-7 Abuse?
Ransom-DDoS gangs (RDoS) and L7 application-floods that bypass volumetric scrubbing by mimicking real users. Prevention via WAF/DDoS provider + rate-limiting dominates; response speed determines downtime cost. Residual exists because bot-driven L7 traffic is hard to distinguish from a flash crowd. CISO Game tracks this as R34 in the live risk register, severity 7 (Major), category External.
How does CISO Game model DDoS-Extortion / Layer-7 Abuse?
Exposure for R34 runs from 0 to 100, recomputed live as you buy, cancel, or reassign products. How the exposure model works →
Real-world parallel
DDoS-extortion shifts DDoS from a nuisance into a ransom event — pay or stay offline. The control posture is the same as R05 but the strategic question is whether the company has a published "we don't pay extortionists" policy and the executive willingness to absorb a sustained outage to honor it.
How do security teams mitigate DDoS-Extortion / Layer-7 Abuse?
The dominant subscore levers for this risk are:
- Prevention subscore — weight 45%
- Response subscore — weight 30%
- Detection subscore — weight 10%
- Recovery subscore — weight 10%
Residual offset: +5 exposure points are structural — no product fully removes them. Real-world parallels: zero-day windows, vendor monoculture, regulator unpredictability.
Which investments mitigate DDoS-Extortion / Layer-7 Abuse?
Products in CISO Game that reduce exposure to R34:
- WAF + DDoS ProtectionNetwork
- Intrusion Prevention System (IPS)Network
- Threat intelligence feedServices
- Hire Network EngineerHeadcount
Which related risks should you also watch?
Risks with similar dominant subscores or shared category — addressing one often helps the others:
- R04 Web Application AttackExternal · severity 8
- R38 API Abuse / Broken Object-Level AuthorizationExternal · severity 8
- R05 DDoSExternal · severity 5
- R14 Data Loss (accidental)Data · severity 6
Why does DDoS-Extortion / Layer-7 Abuse matter to a CISO?
External adversarial risks like ddos-extortion / layer-7 abuse are the risks boards expect their CISO to talk about. They drive the strongest demand for detection + response capability and the strongest emotional response in the boardroom.
How can you test your mitigation strategy?
Click Play CISO Game free to see R34 appear live in your risk register and watch each purchase move the exposure number in real time. No signup required.
Stress-test DDoS-Extortion / Layer-7 Abuse in the Standard run scenario →