Home > Cyber News > DDoS Attack Exploits Flaws in WordPress via an Encrypted Channel
CYBER NEWS

DDoS Attack Exploits Flaws in WordPress via an Encrypted Channel

Encryption is now being used in DDoS attacks, Kaspersky researchers have found. The company has uncovered a specific attack exploiting vulnerabilities in WordPress via an encrypted channel. Because of the difficulty to identify them amongst clean requests, these attacks are very successful. The attacks have been dubbed “pingback”.

Related: DDoS Attack Exploits Flaws in WordPress via an Encrypted Channel

WordPress PingBack Attacks Technical Overview

These attacks have been happening since 2014, researchers say. Basically, the victim’s resource is attacked via third-party servers by exploiting vulnerabilities in them.

For WordPress, a PingBack attack is based on sites created via the CMS with the Pingback function enables. The function sends notifications to authors automatically whenever there is activity on their posts. The attacker would send a specially crafted HTTP request to these sites using a fake return address (the address of the victim who receives the responses). What does this all mean? Basically, it means that it’s possible to carry out a powerful HTTP GET flood attack without using a botnet, altogether making the attack simple and low-cost.

However, the amplified HTTP GET request has a very specific header – User Agent – which makes such malicious queries easy to detect and block in the overall traffic flow.

Kaspersky researchers highlight that the recent attack they observed “differed from a “classic” WordPress Pingback attack in that it was conducted via HTTPS rather than HTTP.” More interestingly, the target of the attack the company observed turned out to be one of their customers.

Alexander Khalimonenko, DDoS protection group manager at Kaspersky Lab, said in a press release that:

The use of encryption makes it more difficult to detect an attack and protect against it because it requires traffic decryption to analyze queries to check whether it’s ‘clean’ or ‘junk’. At the same time, such an attack creates a bigger load on the attacked resource’s hardware than a standard attack, because setting up an encrypted connection requires the use of ‘heavy’ mathematics. Another difficulty lies in the fact that modern encryption mechanisms do not allow third-party access to traffic content. In this regard, security solutions will have to reconsider their filtering algorithms in order to protect customers from the growing popularity of DDoS attacks with encryption.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

1 Comment
  1. Liau Kim Jun

    Hi,

    My computer been attacked by Ransomware and the file type become .9608 format which unable to open. There is some photo below for the reference.

    uploads.disquscdn.com/images/de358d3c4c5a8441b8c502e3cf4e652a0f2dd43b1f70454c5cfac97beb1e2235.jpg

    I have installed Malwarebytes program and it did not help.

    Will you able to advice? Looking forward to hear from you soon.

    Thanks.
    Liau

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree