Attacks/Breaches

8/16/2017
02:55 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Websites Selling DDoS Services and Tools on the Rise in China

Researchers detect an increase in Chinese websites offering online DDoS services within the past six months.

Cyberattackers in China are gravitating toward online DDoS platforms, as evidenced by a recent surge in Chinese websites offering DDoS services.

Researchers at Cisco Talos, a division of Cisco focused on threat intelligence, detected a spike in the number of Chinese websites selling DDoS tools in the past three to six months. The shift was first detected while monitoring conversations in group chats populated by Chinese hackers.

"We monitor Chinese hacker forums and group chats, where we observed numerous groups advertising the websites for their online DDoS platforms," says Talos senior threat researcher David Liebenberg.

Social media apps WeChat and QQ host hundreds of chats where hackers, customers, agents, and advertisers discuss DDoS groups, tools, malware, and targets. DDoS tools and services are among the most sought-after products on the Chinese underground market. It's easy for even novice attackers to operate these platforms and launch attacks, he notes.

"Online DDoS services potentially expand the customer base by providing a more convenient user experience and relatively safer payment options through third-party sites," Liebenberg says of the increase. "Chinese actors could also have observed the popularity of online booter services in other countries and the profits they have yielded."

Many recently discovered websites share "nearly identical" functionality and design, displaying the number of active users and servers, and total number of successful attacks, researchers found. They also have announcements on tool updates, capabilities, and restrictions. Users can register accounts, buy activation codes to launch attacks, and attack their targets.

Talos researchers noticed many websites had "ddos" in their domain names, a finding that helped identify the increase in sellers and confirm 32 nearly-identical Chinese online DDoS websites. It's assumed there are more out there since not all share sites have "ddos" in the domain.

Given the similarities, they initially suspected one actor was operating under multiple aliases. Nearly all of the sites used Chinese registrars, most were registered in the past three months (nearly all in the last year), and more than half were hosted on Cloudllare IPS.

The single-actor theory was discarded when they found sites were using different third-party Chinese payment platforms and displaying different tool capabilities, contact info, and numbers for active users and attacks. Most websites had different registrant names and emails, and different registrars listed, leading researchers to think multiple actors are involved.

The sites' similarities are likely due to shared source code, which actors can purchase on Chinese forums and marketplaces. This code "lowers the bar" for groups wanting to create their own DDoS service, Liebenberg says. Chinese hacker forums began distributing source code for DDoS platforms in late 2016, explaining the recent uptick this year.

"As other actors see more sites being stood up and making money, they attempt to create their own websites," he adds.

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.

It's unknown where the source code originated, though it was originally written in English. There are many English-language booters sharing similarities like the Bootstrap design, Cloudflare hosting, and related graphics and toolbars, Liebenberg continues.

"My best guess is that a Chinese actor obtained source code for one of these tools and adjusted it," he says. "What most stands out is the degree to which it has been localized for Chinese consumers, such as changing the PayPal logo to an Alipay pogo, or automatically including a Terms of Service written in Chinese."

Researchers also saw DDoS platforms requesting attacks on one another. Actors in several group chats discussed attacks on rival groups, and traffic indicated some were hit with attacks.

"I believe they are attacking each other because they are competing for customers," says Liebenberg. "It is not uncommon to see Chinese 'grey market' services, such as pirated online game servers, using means such as DDoS to take out rivals."

Could these attacks extend to foreign victims? It's possible, he says. In fact, it would be consistent with Chinese DDoS targeting practices seen in other hacker forums and group chats. There is no restriction preventing customers from targeting hosts in other countries.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Number of Retailers Impacted by Breaches Doubles
Ericka Chickowski, Contributing Writer, Dark Reading,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19990
PUBLISHED: 2018-07-23
October CMS version prior to build 437 contains a Cross Site Scripting (XSS) vulnerability in the Media module and create folder functionality that can result in an Authenticated user with media module permission creating arbitrary folder name with XSS content. This attack appear to be exploitable v...
CVE-2018-19990
PUBLISHED: 2018-07-23
October CMS version prior to Build 437 contains a Local File Inclusion vulnerability in modules/system/traits/ViewMaker.php#244 (makeFileContents function) that can result in Sensitive information disclosure and remote code execution. This attack appear to be exploitable remotely if the /backend pat...
CVE-2018-19990
PUBLISHED: 2018-07-23
FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fix...
CVE-2018-19990
PUBLISHED: 2018-07-23
FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provide...
CVE-2018-19990
PUBLISHED: 2018-07-23
FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially c...