DDoS attackers have found this new trick to knock over websites

Distributed denial of service (DDoS) attackers are using a new technique to knock websites offline by targeting vulnerable ‘middleboxes’, such as firewalls, to amplify junk traffic attacks. 

Amplification attacks are nothing new and have helped attackers knock over servers with short busts of traffic as high as 3.47 Tbps. Microsoft last year mitigated attacks on this scale that were the result of competition between online-gaming players

But there’s a new attack on the horizon. Akamai, a content distribution network firm, says it has seen a recent wave of attacks using “TCP Middlebox Reflection”, referring to transmission control protocol (TCP) – a founding protocol for secured communications on the internet between networked machines. The attacks reached 11 Gbps at 1.5 million packets per second (Mpps), according to Akamai.

SEE: Cybersecurity: Let’s get tactical (ZDNet special report)

The amplification technique was revealed in a research paper last August, which showed that attackers could abuse middleboxes such as firewalls via TCP to magnify denial of service attacks. The paper was from researchers at the University of Maryland and the University of Colorado Boulder.

Most DDoS attacks abuse the User Datagram Protocol (UDP) to amplify packet delivery, generally by sending packets to a server that replies with a larger packet size, which is then forwarded to the attacker’s intended target. 

The TCP attack takes advantage of network middleboxes that don’t comply with the TCP standard. The researchers found hundreds of thousands of IP addresses that could amplify attacks by over 100 times utilizing firewalls and content filtering devices. 

So, what was a theoretical attack just eight months ago is now a real and active threat. 

“Middlebox DDoS amplification is an entirely new type of TCP reflection/amplification attack that is a risk to the internet. This is the first time we’ve observed this technique in the wild,” it says in a blogpost

Firewalls and similar middlebox devices from the likes of Cisco, Fortinet, SonicWall and Palo Alto Networks, are key pieces of corporate network infrastructure. Some middleboxes however don’t properly validate TCP stream states when enforcing content filtering policies. 

“These boxes can be made to respond to out-of-state TCP packets. These responses often include content in their responses meant to “hijack” client browsers in an attempt to prevent users from getting to the blocked content. This broken TCP implementation can in turn be abused to reflect TCP traffic, including data streams, to DDoS victims by attackers,” Akamai notes. 

Attackers can abuse these boxes by spoofing the source IP address of the intended victim to direct response traffic from the middleboxes. 

In TCP, connections use the synchronize (SYN) control flag to exchange key messages for a  three-way handshake. The attackers abuse the TCP implementation in some middelboxes that cause them to unexpectedly respond to SYN packet messages. In some cases, Akamai observed that a single SYN packet with a 33-byte payload produced a 2,156-byte response, amplifying its size by 6,533%.   

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Stopwatch and more: Widget in Pixel Launcher gets 3 new features thumbnail

Stopwatch and more: Widget in Pixel Launcher gets 3 new features

Vermutlich ist es noch ein Testlauf, aber Google erweitert das Widget auf Start- und Sperrbildschirm seiner Pixel-Geräte mit weiteren Informationen. Drei neue Optionen starten gerade international. Google erweitert die Live-Anzeige. Neue Optionen kommen in den Pixel-Launcher. Noch handelt es sich wohl um einen Testlauf. Google macht seine Ankündigungen der letzten Monate langsam wahr und beginnt…
Read More
ByteDance revenue growth slowed to 70% in 2021: report thumbnail

ByteDance revenue growth slowed to 70% in 2021: report

Chinese tech giant ByteDance saw its total revenue grow by 70% year on year to around $58 billion in 2021, Reuters reported on Thursday, citing people with knowledge of the matter. The growth rate represents a slow down from the more than 100% year on year growth achieved in 2020, with China’s tightened regulations on…
Read More
3 nitpicky complaints about Apple's Peek Performance event thumbnail

3 nitpicky complaints about Apple’s Peek Performance event

Reviews, News, CPU, GPU, Articles, Columns, Other "or" search relation.3D Printing, 5G, Accessory, AI, Alder Lake, AMD, Android, Apple, ARM, Audio, Biotech, Business, Camera, Cannon Lake, Cezanne (Zen 3), Charts, Chinese Tech, Chromebook, Coffee Lake, Comet Lake, Console, Convertible / 2-in-1, Cryptocurrency, Cyberlaw, Deal, Desktop, E-Mobility, Education, Exclusive, Fail, Foldable, Gadget, Galaxy Note, Galaxy S,…
Read More
Three ways to upgrade Windows 11 for free, with link to upgrade immediately!!! thumbnail

Three ways to upgrade Windows 11 for free, with link to upgrade immediately!!!

目前微軟的 Windows 10 已經開始免費提供升級到 Windows 11 的服務,只不過該服務當下主要面向於搭載 Windows 10 的新裝置,其餘符合條件的裝置會在後續陸續提供升級資源。Windows 11 系統對於硬件的要求頗高,所以導致了運行 Windows 10 系統的裝置不一定可以升級為 Windows 11。官方給出的升級條件是裝置需要搭載 Intel 第八代 Coffee Lake 或 AMD Zen 2 處理器及以上,支援 TPM 2.0,至少配備 4GB RAM+64GB ROM。官方給出的條件較為苛刻,導致數百萬台電腦無法正式升級到 Windows 11。有困難就有方法去克服,網上肯定會有第三方的其他升級方式。微軟的 Windows 11 系統採用逐步推出的形式來讓裝置進行升級,這意味著免費升級服務不會提供給所有現有符合條件的電腦。微軟的說法為,現有符合審升級條件的裝置應該會在 2022年中期前獲得 Windows 11 的升級。目前升級Windows 11系統主要有三種方式。第一種方法為 Windows 11 安裝助手,該方式是最佳最方便的升級方式,只需下載安裝助手,軟件會進行硬件檢測,當裝置符合要求便會選擇合適的升級的版本和語種開始下載和進入安裝程式。下載網址:https://go.microsoft.com/fwlink/?linkid=2171764第二種方法為創建 Windows 11 安裝媒體。先下載媒體創建工具,然後通過工具來製作可引導的 USB 或 DVD,最後創建本地安裝媒介便可多次使用進行升級無需再次進行下載過程。下載網址:https://go.microsoft.com/fwlink/?linkid=2156295第三種方法為下載 Windows 11 映像(ISO)檔。該方式較為複雜,需要創建可引導安裝媒體(USB、DVD)或創建虛擬機(.ISO 文件),用來安裝 Windows…
Read More
Ordine de Inrolare False si Avertismentul Armatei Romane thumbnail

Ordine de Inrolare False si Avertismentul Armatei Romane

Armata Romana emite o noua avertizare cu privire la ordinele de inrolare false care circula in mediul online in momentul de fata, iar asta pentru ca multi oameni au inceput sa distribuie pe retelele de socializare imagini precum cea de mai jos, totul in contextul razboiului din Ucraina. Armata Romana spune ca aceste imagini sunt…
Read More
Index Of News
Total
0
Share