Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

DDoS attack detected at 400Gbps

by The Gurus
February 12, 2014
in Editor's News
Share on FacebookShare on Twitter

A distributed denial-of-service (DDoS) attack which was registered at 400Gbps has been spotted, eclipsing the Spamhaus attack from last year.
 
Last June, the anti-spam organisation was hit by a 300Gbps attack. Content delivery firm CloudFlare, who were tasked with protecting Spamhaus and were also hit, announced this week’s attack.
 
Matthew Prince, CEO and co-founder and CloudFlare, said via his Twitter account that a “very big NTP reflection attack [is] hitting us right now. Appears to be bigger than the Spamhaus attack from last year.” He later said that he was unable to disclose who was being attacked that “someone’s got a big, new cannon. Start of ugly things to come.”
 
Prince said that this was made possible by a misconfigured NTP server, likely with a 100Mbps connection with 80 per cent utilisation, and the attacker would need a 1Gbps connection.
 
Tim ‘TK’ Keanini, CTO at Lancope, said: “This type of amplification attack is as old as the internet itself and as long as there is a protocol out there by which a single packet generates ten (or greater) packets in return, we will have this type of problem.
 
“NTP, DNS and a few other UDP (connectionless protocols) services have had vulnerable versions used in this type of DDoS. All of them are patched and fixed but the problem is that people don’t manage their services the way that they should. The fix has been available for a very long time and websites exist that freely test for these vulnerabilities, but still the administrators of these servers are irresponsibly leaving them unpatched and are helping attackers do this type of damage.”
 
Eduardo de la Arada, research team engineer at AlienVault, explained that this is another reflection technique, as an NTP server is a server used to synchronize the system clock.
 
“One of the available requests is MON_GETLIST; it returns the addresses of up to the last 600 machines that the NTP server has interacted with. So, with a small (234 bytes) request, the server could respond with a big package (48k more or less). You can modify the sender address to the targets ones, and send a lot of requests to multiple NTP servers, the generated traffic sent to the target could be enormous,” he said.
 
He suspected that the 400Gbps size of the attack was achieved by collecting as many NTP servers as possible. “The more servers they have collected, the stronger the attack will be. Not all servers have this feature, it was removed, so the attackers must scan internet looking for a version older than 4.2.7.”
 
Keanini said that the reason these attacks are getting larger is because pipes are getting larger and at these rates, you are limited by the capacity of some transit link to the victim.
 
“The bigger the pipes, the greater the volumetric attack.  Next year I expect to see this at least double in terms of traffic/sec,” he said.

FacebookTweetLinkedIn
Tags: attackDDoS
ShareTweetShare
Previous Post

FIDO Alliance launches authentication review draft

Next Post

Microsoft adds two more patches to February bundle

Recent News

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023
Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information