Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Exploits

Reflective DDoS attack Utilizes UPnP Devices

Paul Anderson by Paul Anderson
October 21, 2014
in Exploits, Security
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Greater than 4 million business and consumer devices-such as modems, media servers and Web cams-could be utilized by attackers in a distributed denial-of-service attack due to weaknesses in the Universal Plug-and-Play (UPnP) standard, Internet infrastructure firm Akamai issued in an advisory published on Oct. 15.

You might also like

Google reports a rise in ransomware attacks

Cross-Site Scripting (XSS) attack method steals your browser’s auto-fill credentials

Citrix exploit CWE-284 allows hackers to reset admin password

Attackers have exploited the protocol to deliver control messages to UPnP units, discovering a means to trigger a reply from the devices that may be sent to halt a targeted network.

DDoS attacks making use of the method have been gradually growing since July, when Akamai first discovered the technique and now are the cause of 7.3 percent of system attacks, Rod Soto, principal security researcher with Akamai’s Prolexic Security, stated.

Reflection and amplification attacks use unauthenticated communications within the Internet infrastructure to distribute the apparent sources of an attack and magnify the volume of data sent to a target. Reflection attacks send forged network requests to vulnerable devices-Domain Name Service (DNS) and Network Time Protocol (NTP) servers are common-which then respond to the spoofed source address.

The attacks appear to come from a large number of devices, rather than the few systems controlling the attack. Amplification attacks work similarly, but are focused on protocols that have large responses compared to the request size. NTP servers, for example, can be manipulated into magnifying a 64-byte request by a factor of more than 700.

In the UPnP attack, malicious operators use the Simple Service Discovery Protocol (SSDP) and send spoofed control packets. The attack is useful for both reflection attacks, given the number of vulnerable devices, and amplification as researchers estimate that it can magnify attack traffic by a factor of 30, according to Web security firm Sucuri.

By using thousands, or tens of thousands, of devices, attackers can inundate a network with data, Akamai’s Soto said. In a recent attack, Akamai witnessed a combined bandwidth of 54 Gbps, which falls short of the massive 300 Gbps used in an amplification attack against antispam group SpamHaus, but is still much larger than typical attacks.

“When you put it together and you add a lot of these types of devices, you will get a sizable bandwidth,” he said.

Akamai has found two tools—ssdpscanner.py for scanning and ssdpattack.py for the actual attack—that have been used to conduct UPnP reflection campaigns.

A scan of the Internet found 11 million vulnerable UPnP devices, but only 38 percent of those devices, about 4.1 million, appear to respond to spoofed commands, Akamai stated in its analysis. South Korea has the largest number of vulnerable devices, followed by the United States, Canada, and China.

“The prevalence of vulnerable devices is likely to drive the development of new tools to take advantage of the SSDP and SOAP protocols, which will likely also lead to UPnP device-based reflection attack tools and botnets being monetized in the DDoS-for-hire underground market,” the company warned.

Article info originated from Eweek.com

Tags: Denial-of-service attackexploitUPnPvulnerability
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Google reports a rise in ransomware attacks

by Paul Anderson
July 15, 2022
0
Google reports a rise in ransomware attacks

In the 3rd issue of the recently released, Threat Horizons, Google's Cybersecurity Action Team (GCAT) provides organizations with information about emerging risks and actionable mitigation. Bad actors have...

Read more

Cross-Site Scripting (XSS) attack method steals your browser’s auto-fill credentials

by Christi Rogalski
July 11, 2022
0
Cross-Site Scripting (XSS) attack method steals your browser’s auto-fill credentials

Cross-site scripting, also known as XSS, attacks rank high on lists of common cybersecurity risks. It is the injection of malicious code into the web application to exploit...

Read more

Citrix exploit CWE-284 allows hackers to reset admin password

by Christi Rogalski
July 8, 2022
0
Citrix CWE-284 CVE-2022-27511 exploit

A critical bug has been identified in the Citrix Application Delivery Management console (ADM) that, if exploited, could lead to a serious security breach including allowing the attackers...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more
Next Post
Staples: Breached Investigation Launched

Staples: Breached Investigation Launched

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.