Requests may seem benign | xxxRequests may seem benign – xxx
菜单

Requests may seem benign

七月 24, 2019 - BleepingComputer

Requests may seem benign

A botnet of over 400,000 IoT devices held a 13-day distributed denial-of-service (DDoS) siege against the streaming app of a company in the entertainment business.

Directed at the authentication component, the attack started around April 24 and hit with as many as 292,000 requests per second (RPS) at its peak, making it one of the largest Layer 7 DDoS strikes.

It held a constant rate above 100,000 requests and the adversary kept the flow well over 200,000 requests for the last six days.

Requests may seem benign

A Layer 7 (application layer) DDoS attack is not meant to exhaust the internet connection bandwidth, as is the case with volume-based attacks (e.g. UDP, ICMP floods), or a system’s resources (SYN flood). Since the target is an application, the intent is to hit it with so many GET/POST requests that the server crashes.

DDoS mitigation company Imperva held the service running for the entire duration of the attack, observing requests from 402,000 different IP addresses.

Most of the attacking devices were located in Brazil, the company says in a report today, noting that this was the largest Layer 7 DDoS assaults it dealt with.

Requests may seem benign

Spikes as high as 300,000 RPS have been observed in the past. In 2017, the website for the Russian newspaper Meduza was a target of a DDoS attack with requests above the volume observed by Imperva.

Because the attacker also focused on the authentication component of the service, the intent remains unclear in the incident handled by Imperva. The botnet’s main goal may have been testing credentials on the service by brute-forcing the login.

However, this large a volume of requests can lead to a denial-of-service condition when no proper mitigation solutions were in place.

“The attackers used a legitimate User-Agent, the same as used by the entertainment industry customer service application, to mask their attack.” – Imperva’s Vitaly Simonovich

Linking this activity to an IoT botnet was possible by looking at the ports used. Imperva saw that most of the devices sending the requests had ports 7547 and 2000 open.

Port 7547 is a standard one for the Customer Premises Equipment WAN Management Protocol (CWMP) – intended for auto-configuration and remote management of home routers, modems, and other CPEs.

Port 2000 is also linked to routers, MikroTik in particular, as it is used on these devices for the bandwidth test server protocol.

Requests may seem benign

Layer 7 DDoS attacks can be difficult to defend against because applications are designed to accept requests from users and serve them resources.

In this case, the adversary also used the same user agent as the service’s application and targeted the authentication component.

Distinguishing the malicious connections from the botnet became more difficult because the requests came from distinct systems and were for legitimate action.

Furthermore, brute-force protection would not work in this instance, since there were so many bots that could try different credentials. When the limit would be reached, the bot could take a break and then resume activity.

This technique has been named “low and slow” exactly because it takes longer for the adversary to achieve their goal, but it is also harder to defend against since it mimics the activity of a legitimate user.

Related Articles:

Exposed Docker APIs Abused by DDoS, Cryptojacking Botnet Malware

DDoS Attack on Telegram Messenger Leaves Users Hanging

BlueKeep Scanner Discovered in Watchbog Cryptomining Malware

Hackers Exploit Jira, Exim Linux Servers to “Keep the Internet Safe’

Updated Miori Botnet C2 Server Tells Researchers to F*** Off

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51