• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new 'loop dos' attack impacts hundreds of thousands of systems

New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems

You are here: Home / General Cyber Security News / New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems
March 20, 2024

A novel denial-of-company (DoS) attack vector has been observed to goal application-layer protocols centered on Person Datagram Protocol (UDP), placing hundreds of countless numbers of hosts very likely at risk.

Known as Loop DoS attacks, the tactic pairs “servers of these protocols in this sort of a way that they connect with each individual other indefinitely,” researchers from the CISPA Helmholtz-Heart for Details Security claimed.

UDP, by design, is a connectionless protocol that does not validate supply IP addresses, making it vulnerable to IP spoofing.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


So, when attackers forge various UDP packets to include a sufferer IP address, the destination server responds to the victim (as opposed to the risk actor), making a reflected denial-of-assistance (DoS) attack.

Cybersecurity

The newest research located that specified implementations of the UDP protocol, these kinds of as DNS, NTP, TFTP, Lively Customers, Daytime, Echo, Chargen, QOTD, and Time, can be weaponized to build a self-perpetuating attack loop.

“It pairs two network products and services in these a way that they retain responding to just one another’s messages indefinitely,” the researchers claimed. “In executing so, they generate big volumes of site visitors that result in a denial-of-support for included programs or networks. After a bring about is injected and the loop set in motion, even the attackers are not able to stop the attack.”

Set only, supplied two application servers managing a susceptible model of the protocol, a risk actor can initiate communication with the initially server by spoofing the address of the second server, triggering the initially server to reply to the sufferer (i.e., the next server) with an error concept.

The victim, in transform, will also exhibit similar actions, sending back again a further mistake message to the 1st server, proficiently exhausting each other’s sources and building either of the companies unresponsive.

“If an mistake as input creates an mistake as output, and a next process behaves the same, these two methods will hold sending mistake messages again and forth indefinitely,” Yepeng Pan and Christian Rossow explained.

Cybersecurity

CISPA reported an believed 300,000 hosts and their networks can be abused to carry out Loop DoS attacks.

Though there is at present no proof that the attack has been weaponized in the wild, the researchers warned that exploitation is trivial and that various items from Broadcom, Cisco, Honeywell, Microsoft, MikroTik, and Zyxel are influenced.

“Attackers need a single spoofing-able host to induce loops,” the scientists mentioned. “As these types of, it is vital to retain up initiatives to filter spoofed targeted traffic, this sort of as BCP38.”

Identified this posting interesting? Observe us on Twitter  and LinkedIn to study far more exclusive content we put up.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «generative ai security secure your business in a world Generative AI Security – Secure Your Business in a World Powered by LLMs
Next Post: Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug atlassian releases fixes for over 2 dozen flaws, including critical»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.