Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Exploits

300Gbps DDoS attack on firm exploits server flaw

Paul Anderson by Paul Anderson
August 18, 2014
in Exploits, Security
0
about verisign inc
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Hacktivists launched up an immense and formerly undocumented 300Gbps DDoS attack earlier this summer by taking advantage of an obscure motherboard-level exploit on 100,000 unpatched servers, VeriSign has disclosed in their latest quarterly Trends report.

You might also like

BreachForums Owner Arrested and Charged

Plex media server seen exploited in the wild utilizing a 3 year old RCE

New TPM 2.0 exploit attackers to access or overwrite sensitive data

As with all other DDoS trends nowadays, VeriSign’s analysis notes the growing measurements of DDoS attacks in the second quarter though the more surprising news is really what happened to one of its customers in the second quarter, around June.

Referred to as being a content delivery network (CDN) in the media and entertainment field, an unidentified datacentre discovered itself receiving the end of a motivated DDoS “siege”, which began with a three-hour SYN and TCP flood, a typical process to weaken it’s target.

Following mitigation, the attackers altered the attack to use massive UDP packets, rapidly achieving a peak traffic level of 250 Gbps that required VeriSign to begin shuffling the strain around its global capacity. For an additional 24 hours, the mitigation systems had to deal with more than 30 short but large bursts of UDP and TCP floods as the attackers probed for weak points.

Within a final attack to take down the target, the quantity ramped up to 300Gbps, causing this to be among the largest DDoS attacks ever publically shared. Repelled by VeriSign’s mitigations systems, it took 30 hours for the attackers to halt.

The DDoS attack documented by VeriSign called its enormous strength from a botnet comprised of up to 100,000 servers susceptible to the ‘Supermicro IPMI [Intelligent Platform Management Interface]’ flaw, published by researcher Zachary Wikholm on 19 June. This motherboard-level issue permitted hackers to get into an unencrypted password file for a system by connecting via software port 49152.

The attackers knew what they were doing. An additional noticeable method was to sneak malformed packets past mitigation by placing them within GRE (Generic Routing Encapsulation) tunnels.

Tags: ddosDenial-of-service attackVeriSign
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BreachForums Owner Arrested and Charged

by Paul Anderson
March 17, 2023
0
BreachForums Owner Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

Plex media server seen exploited in the wild utilizing a 3 year old RCE

by Kyle
March 11, 2023
0
Plex RCE responsible-for lastpass breach

CISA, the cybersecurity and infrastructure agency, has included a severe remote code execution (RCE) vulnerability in the Plex Media Server, which is nearly three years old, in its...

Read more

New TPM 2.0 exploit attackers to access or overwrite sensitive data

by Paul Anderson
March 5, 2023
0
New TPM 2.0 Exploit

Two buffer overflow vulnerabilities have been discovered in the Trusted Platform Module (TPM) 2.0 specification, which could give cybercriminals unauthorized access to or the ability to overwrite sensitive...

Read more

Stolen credit card market BidenCash leaks over 2 million credit cards

by Paul Anderson
March 3, 2023
0
Stolen credit card market BidenCash leaks over 2 million credit cards

BidenCash, a marketplace that focuses on carding, has leaked a database of 2,165,700 credit and debit cards to celebrate its first anniversary. Instead of keeping the leak a...

Read more

Google reports a rise in ransomware attacks

by Paul Anderson
July 15, 2022
0
Google reports a rise in ransomware attacks

In the 3rd issue of the recently released, Threat Horizons, Google's Cybersecurity Action Team (GCAT) provides organizations with information about emerging risks and actionable mitigation. Bad actors have...

Read more
Next Post
4.5m Patients at risk after Community Health systems breach

4.5m Patients at risk after Community Health systems breach

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.