Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Exploits

Reflective DDoS attack Utilizes UPnP Devices

Paul Anderson by Paul Anderson
October 21, 2014
in Exploits, Security
0
Upnp logo
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Greater than 4 million business and consumer devices-such as modems, media servers and Web cams-could be utilized by attackers in a distributed denial-of-service attack due to weaknesses in the Universal Plug-and-Play (UPnP) standard, Internet infrastructure firm Akamai issued in an advisory published on Oct. 15.

You might also like

BreachForums Owner Arrested and Charged

Plex media server seen exploited in the wild utilizing a 3 year old RCE

New TPM 2.0 exploit attackers to access or overwrite sensitive data

Attackers have exploited the protocol to deliver control messages to UPnP units, discovering a means to trigger a reply from the devices that may be sent to halt a targeted network.

DDoS attacks making use of the method have been gradually growing since July, when Akamai first discovered the technique and now are the cause of 7.3 percent of system attacks, Rod Soto, principal security researcher with Akamai’s Prolexic Security, stated.

Reflection and amplification attacks use unauthenticated communications within the Internet infrastructure to distribute the apparent sources of an attack and magnify the volume of data sent to a target. Reflection attacks send forged network requests to vulnerable devices-Domain Name Service (DNS) and Network Time Protocol (NTP) servers are common-which then respond to the spoofed source address.

The attacks appear to come from a large number of devices, rather than the few systems controlling the attack. Amplification attacks work similarly, but are focused on protocols that have large responses compared to the request size. NTP servers, for example, can be manipulated into magnifying a 64-byte request by a factor of more than 700.

In the UPnP attack, malicious operators use the Simple Service Discovery Protocol (SSDP) and send spoofed control packets. The attack is useful for both reflection attacks, given the number of vulnerable devices, and amplification as researchers estimate that it can magnify attack traffic by a factor of 30, according to Web security firm Sucuri.

By using thousands, or tens of thousands, of devices, attackers can inundate a network with data, Akamai’s Soto said. In a recent attack, Akamai witnessed a combined bandwidth of 54 Gbps, which falls short of the massive 300 Gbps used in an amplification attack against antispam group SpamHaus, but is still much larger than typical attacks.

“When you put it together and you add a lot of these types of devices, you will get a sizable bandwidth,” he said.

Akamai has found two tools—ssdpscanner.py for scanning and ssdpattack.py for the actual attack—that have been used to conduct UPnP reflection campaigns.

A scan of the Internet found 11 million vulnerable UPnP devices, but only 38 percent of those devices, about 4.1 million, appear to respond to spoofed commands, Akamai stated in its analysis. South Korea has the largest number of vulnerable devices, followed by the United States, Canada, and China.

“The prevalence of vulnerable devices is likely to drive the development of new tools to take advantage of the SSDP and SOAP protocols, which will likely also lead to UPnP device-based reflection attack tools and botnets being monetized in the DDoS-for-hire underground market,” the company warned.

Article info originated from Eweek.com

Tags: Denial-of-service attackexploitUPnPvulnerability
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BreachForums Owner Arrested and Charged

by Paul Anderson
March 17, 2023
0
BreachForums Owner Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

Plex media server seen exploited in the wild utilizing a 3 year old RCE

by Kyle
March 11, 2023
0
Plex RCE responsible-for lastpass breach

CISA, the cybersecurity and infrastructure agency, has included a severe remote code execution (RCE) vulnerability in the Plex Media Server, which is nearly three years old, in its...

Read more

New TPM 2.0 exploit attackers to access or overwrite sensitive data

by Paul Anderson
March 5, 2023
0
New TPM 2.0 Exploit

Two buffer overflow vulnerabilities have been discovered in the Trusted Platform Module (TPM) 2.0 specification, which could give cybercriminals unauthorized access to or the ability to overwrite sensitive...

Read more

Stolen credit card market BidenCash leaks over 2 million credit cards

by Paul Anderson
March 3, 2023
0
Stolen credit card market BidenCash leaks over 2 million credit cards

BidenCash, a marketplace that focuses on carding, has leaked a database of 2,165,700 credit and debit cards to celebrate its first anniversary. Instead of keeping the leak a...

Read more

Google reports a rise in ransomware attacks

by Paul Anderson
July 15, 2022
1
Google reports a rise in ransomware attacks

In the 3rd issue of the recently released, Threat Horizons, Google's Cybersecurity Action Team (GCAT) provides organizations with information about emerging risks and actionable mitigation. Bad actors have...

Read more
Next Post
Staples: Breached Investigation Launched

Staples: Breached Investigation Launched

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.