DDoS attacks could soon be ramped up to unthinkable levels

Lately, we’ve been hearing about some huge DDoS attacks, but apparently these could be regarded as relative small fry thanks to a freshly discovered amplification technique which is ripe to be fully exploited.

This new hatful of DDoS hell comes in the form of a zero-day attack vector that leverages the Lightweight Directory Access Protocol (or LDAP, the directory service protocol used in most servers) to effectively amplify a distributed denial of service attack.

This technique was spotted being used last week in an attack on one of Corero Network Security’s clients, but the worry is that it might be employed in conjunction with a massive botnet-powered volley of DDoS to make for a blast of staggering proportions.

In fact, according to Corero, this method could amplify attacks by a factor of as much as 55. So if we look at the recent attack against the website of security researcher Brian Krebs which hit 620Gbps by using the Mirai botnet, that could potentially be amplified into something like 35Tbps of traffic.

Or indeed take the recent attack on OVH.com, the French hosting company, which hit 799Gbps and could be amplified to more like 45Tbps, in theory. Admittedly that’s using peak amplification figures and an absolute worst-case scenario, but the average amplification factor is around 46 times, not too far away from the maximum potential factor of 55. 

And if you combine a botnet of compromised IoT devices with this sort of supercharging, the victim is in for not just a world of pain, but an entire galaxy of the stuff.

 DNS dangers

There’s also the worrying prospect of this sort of level of attack being aimed at major DNS providers such as Dyn, which was bombarded late last week, an assault that resulted in the downing of multiple major websites including Twitter, Spotify, Netflix and Reddit.

Dave Larson, CTO/COO at Corero, commented: “LDAP is not the first, and will not be the last, protocol or service to be exploited in this fashion. Novel amplification attacks like this occur because there are so many open services on the Internet that will respond to spoofed record queries. However, a lot of these attacks could be eased by proper service provider hygiene, by correctly identifying spoofed IP addresses before these requests are admitted to the network.”

He continued: “Specifically, following the best common practice, BCP 38, described in the Internet Engineering Task Force (IETF) RFC 2827, which describes router configurations that are designed to eliminate spoofed IP address usage by employing meaningful ingress filtering techniques, would reduce the overall problem of reflected DDoS by at least an order of magnitude.”

Darren is a freelancer writing news and features for TechRadar (and occasionally T3) across a broad range of computing topics including CPUs, GPUs, various other hardware, VPNs, antivirus and more. He has written about tech for the best part of three decades, and writes books in his spare time (his debut novel - 'I Know What You Did Last Supper' - was published by Hachette UK in 2013).

Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Brad Pitt looks over his right shoulder with 'F1' written behind him
Apple Original Films will take you behind-the-scenes of a racing cockpit in this new thrilling F1 movie trailer
AI writer
Coding AI tells developer to write it himself
Reacher looking down at another character from the Prime Video TV series Reacher
Reacher season 3 becomes Prime Video’s biggest returning show thanks to Hollywood’s biggest heavyweight
Image showing detail of the Leica D-Lux 8
Still can't get a Fujifilm X100VI? This premium Leica compact costs less, and it's in stock
Man using iMessage on an iPhone
Apple will finally enable encrypted RCS messages between iOS and Android, and it's about time
Google Messages update
Google Messages could soon follow WhatsApp with an upgrade that makes it much easier to join group chats