Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security

11/12/2019
11:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

TCP DDoS Reflection Attacks on the Rise

Radware report picks up on a change in attacker strategy.

Radware has found itself in 2019 defending against what it calls a "steady" rise in TCP DDoS reflection attacks. Since low-bandwidth TCP reflection attacks were thought in the past not to be able to generate enough amplification compared to the more used UDP-based reflection method, this is a definite change in attacker strategy.

The company has issued a report, TCP Reflection Attacks, which reveals what it is finding.

In a TCP SYN-ACK reflection attack, an attacker will send a spoofed SYN packet (that has the original source IP replaced by the victim’s IP address) to a wide range of random or pre-selected reflection IP addresses. If the victim does not respond with the last ACK packet the reflection service expects from it, the service will continue to retransmit the SYN-ACK packet giving amplification if there are multiple services involved.

In October, Radware found that sizable amounts of TCP SYN requests from what appeared to be legitimate sources have appeared and indicated an ongoing blacklist spoofing or reflection DDoS campaign. Eurobet was DDoSed in such a manner.

This follows an April TCP-based DDoS attack on financial institutions that experienced a wave of attacks that could be observed externally, independently of the targeted network. These institutions became the target of multi-vector campaigns that produced bursts of high bandwidth and throughput with both UDP and TCP protocols. Such high volumes of TCP in a DDoS situation had not really been seen previously.

Later in October, a multi-vector campaign appeared which targeted the financial and telecommunication industry in Turkey and exhibited the same patterns seen in previous TCP-based campaigns. Multi-vector style attacks were becoming the new normal.

Carpet bombing (attacks that use multiple vectors of attack to target a specific device or service) has been used in a number of notable attacks against South African ISPs. It can be leveraged to increase the hit rate onto the victim’s services and devices that do not respond with RST or ICMP unreachable/host prohibited messages. In the case of the South African ISP attacks, it was used to sidestep DDoS mitigation and target ISP customers.

Radware says that currently, "Over the last 30 days, Radware has observed a number of criminal campaigns that have been abusing the TCP implementation by performing TCP reflection attacks against large corporations. The attacks not only impacted the targeted networks, but also disrupted reflection networks across the world, creating a fallout of suspected SYN-flood attacks by many businesses."

Trying to reset the affected TCP ports didn’t seem to work as mitigation. They seemed to have tried that one. The report says that, "most of the targeted networks did not respond properly to spoofed requests using RST packets. This would have disabled the TCP retransmit amplification. As a result, the TCP reflection attacks had a major impact on the targeted network and also the reflectors used around the world."

The method gums up the legitimate functions of the TCP reflection networks when it being abused for attack purposes, but there is also a secondary effect. The IP addresses of the reflectors are noticed by other networks (usually enterprise ones) and assumed to be in some faulty state because of their irregular behavior. As a response the enterprise may automatically blacklist that IP address in the future, thereby crippling itself on future TCP reflection.

This attack vector is not new, but has been seriously underutilized in the past. While it’s not something an untrained threat actor can use with ease thus far, some other actor may offer the technique as a service. It should be seriously accounted for in an enterprise’s security posture.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Assessing Cybersecurity Risk in Todays Enterprises
Assessing Cybersecurity Risk in Todays Enterprises
COVID-19 has created a new IT paradigm in the enterprise and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...