Casa > cibernético Notícias > New Record: Ataque DDoS em 1.7 Tbp baseada na falha Memcached
CYBER NEWS

Novo recorde: Ataque DDoS em 1.7 Tbp baseada na falha Memcached

Just last week a record-breaking DDoS attack took place – registered at 1.3 Tbps. O alvo era o GitHub, and the attack was based on a flaw in Memcached servers recently made public. It became evident that cybercriminals can exploit Memcached servers to carry out large-scale DDoS attacks that don’t require a lot of computational resources, de acordo com os pesquisadores.

Story relacionado: New maior ataque DDoS no 1.3 Tbps Acessos GitHub

New Record-Breaking DDoS Attack Registered

Just few days later, and this record-breaking DDoS is broken once again with an attack at 1.7 Tbps which was detectou by Netscout Arbor. The attack targeted a customer of a US-based service provider. não é de surpreender, the DDoS was based on the same memcached reflection/amplification method known from the attack on GitHub.

As pointed out by the research team at Arbor, “the sheer number of servers running memcached openly will make this a lasting vulnerability that attackers will exploit”. That it is why it has become crucial to companies to do everything in their power to protect themselves:

Due to the nature of both the memcached service/protocol implementation as well as the prevalence and high bandwidth typically available to memcached reflectors/amplifiers, it is critical that network operators take proactive measures to ensure they are prepared to detect, classify, traceback, and mitigate these attacks, as well as ensure that any memcached installations on their networks and/or networks of their end-customers cannot be exploited as reflectors/amplifiers.

Another critically important step for companies is to start working with DDoS mitigation services that will sufficiently protect against DDoS attacks.

It is highly advisable for network operators to implement source address validation/BCP38/BCP84 in order to prevent their networks, plus the networks of their end-customers from being leveraged in reflection/amplification attacks.

além do que, além do mais, another step to be considered is that network operators scan their IDC networks, so that abusable memcached installations are identify. This would help for the remediation steps to take place on a timely basis, os pesquisadores concluem.

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...