• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new 'loop dos' attack impacts hundreds of thousands of systems

New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems

You are here: Home / General Cyber Security News / New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems
March 20, 2024

A novel denial-of-company (DoS) attack vector has been observed to goal application-layer protocols centered on Person Datagram Protocol (UDP), placing hundreds of countless numbers of hosts very likely at risk.

Known as Loop DoS attacks, the tactic pairs “servers of these protocols in this sort of a way that they connect with each individual other indefinitely,” researchers from the CISPA Helmholtz-Heart for Details Security claimed.

UDP, by design, is a connectionless protocol that does not validate supply IP addresses, making it vulnerable to IP spoofing.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


So, when attackers forge various UDP packets to include a sufferer IP address, the destination server responds to the victim (as opposed to the risk actor), making a reflected denial-of-assistance (DoS) attack.

Cybersecurity

The newest research located that specified implementations of the UDP protocol, these kinds of as DNS, NTP, TFTP, Lively Customers, Daytime, Echo, Chargen, QOTD, and Time, can be weaponized to build a self-perpetuating attack loop.

“It pairs two network products and services in these a way that they retain responding to just one another’s messages indefinitely,” the researchers claimed. “In executing so, they generate big volumes of site visitors that result in a denial-of-support for included programs or networks. After a bring about is injected and the loop set in motion, even the attackers are not able to stop the attack.”

Set only, supplied two application servers managing a susceptible model of the protocol, a risk actor can initiate communication with the initially server by spoofing the address of the second server, triggering the initially server to reply to the sufferer (i.e., the next server) with an error concept.

The victim, in transform, will also exhibit similar actions, sending back again a further mistake message to the 1st server, proficiently exhausting each other’s sources and building either of the companies unresponsive.

“If an mistake as input creates an mistake as output, and a next process behaves the same, these two methods will hold sending mistake messages again and forth indefinitely,” Yepeng Pan and Christian Rossow explained.

Cybersecurity

CISPA reported an believed 300,000 hosts and their networks can be abused to carry out Loop DoS attacks.

Though there is at present no proof that the attack has been weaponized in the wild, the researchers warned that exploitation is trivial and that various items from Broadcom, Cisco, Honeywell, Microsoft, MikroTik, and Zyxel are influenced.

“Attackers need a single spoofing-able host to induce loops,” the scientists mentioned. “As these types of, it is vital to retain up initiatives to filter spoofed targeted traffic, this sort of as BCP38.”

Identified this posting interesting? Observe us on Twitter  and LinkedIn to study far more exclusive content we put up.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «generative ai security secure your business in a world Generative AI Security – Secure Your Business in a World Powered by LLMs
Next Post: Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug atlassian releases fixes for over 2 dozen flaws, including critical»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.