10

Click here to load reader

DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Embed Size (px)

DESCRIPTION

http://bit.ly/UJCuJm | In Q1 2014, Prolexic successfully mitigated its largest DDoS attack campaign against a Prolexic customer, peaking at more than 200 Gbps and 53.5 Mpps. Learn what up-and-coming strategies were used by the attackers in this short presentation. Full details on this attack and other DDoS trends are provided in the Prolexic Q1 2014 DDoS attack report, available for a free download at http://bit.ly/UJCuJm.

Citation preview

Page 1: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

www.prolexic.com

Attack Spotlight: Q1’s Record-setting DDoS Attack

Page 2: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Overview

• In Q1 2014, Prolexic successfully mitigated the largest Distributed Denial of Service (DDoS) attack campaign to ever cross its network

• The attackers used a combination of Network Time Protocol (NTP) reflection and Domain Name Service (DNS) reflection as the main attack vectors

• Variations of the POST flood attack were also used • The attack exceeded 10 hours in duration and was

directed at a European Internet media company • This campaign peaked at more than 200 Gbps and

53.5 Mpps

Page 3: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

DDos techniques involved

• PLXsert identified the latest NTP and DNS reflection attack tools, as well as popular DDoS toolkit known as Drive, in the attack

• The NTP and DNS protocols are susceptible to abuse by malicious actors, producing highly amplified results

• Drive, a DIRT Jumper variant, utilizes a traditional botnet architecture achieved through malware infection

Page 4: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Validated attack vectors

• POST1 & POST2 floods, which target Layer 7 (application layer)

• DNS reflection, which targets Layer 3 & Layer 4 (infrastructure layer)

• NTP monlist reflection, which targets Layer 3 and Layer 4

Page 5: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Validated attack vectors (cont)

• DNS ANY request flood and NTP reflection attack signatures were detected during the campaign

• An application layer attack (Layer 7) generated multiple HTTP (POST) requests with several different signatures, attempting to evade DDoS mitigation technologies

• The POST flood Layer 7 attacks appeared to match those generated by the DIRT Jumper Drive malware

Page 6: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Analysis of associated malware

• The Drive variant associated with this campaign supports nine attack vectors: – GET – POST1 – POST2 – IP – IP2 – UDP – request – timeout – thread

CONFIDENTIAL

Page 7: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Analysis of sourced traffic

• The majority of DNS reflectors were from the United States, as well as Russia and Brazil

• The principal sources of the application attacks were identified as Turkey, Iran and Argentina

• PLXsert verifies the majority of sources from these countries match CPE device signatures

Page 8: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Attack traffic at Prolexic scrubbing centers

Page 9: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

Q1 2014 Global Attack Report

• Download the Q1 2014 Global DDoS Attack Report

• The Q1 2014 report covers: – Analysis of recent DDoS attack trends

– Breakdown of average Gbps/Mpps statistics

– Year-over-year and quarter-by-quarter analysis

– Types and frequency of application layer attacks

– Types and frequency of infrastructure attacks

– Trends in attack frequency, size and sources

– Where and when DDoSers launch attacks

– Case study and analysis

CONFIDENTIAL

Page 10: DDoS Attack Spotlight | Record-setting DDoS Attack | Prolexic Podcast

About Prolexic

• Prolexic Technologies, now part of Akamai, has successfully stopped DDoS attacks for more than a decade

• Our global DDoS mitigation network and 24/7 security operations center (SOC) can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers