24 million routers expose ISPs to DNS-based DDoS attacks
Posted on 02 April 2014.
DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers worldwide. A simple attack can create 10s of Gbps of traffic to disrupt provider networks, enterprises, websites, and individuals anywhere in the world.


Nominumís latest research reveals:
  • More than 24 million home routers on the Internet have open DNS proxies which expose ISPs to DNS-based DDoS attacks
  • In February 2014, more than 5.3 million of these routers were used to generate attack traffic
  • During an attack in January 2014, more than 70% of total DNS traffic on a providerís network was associated with DNS amplification
  • DNS is by far the most popular protocol for launching amplification attacks, with more available amplifiers than the next four protocols combined.
DNS amplification attacks require little skill or effort and cause major damage; this is the reason why they are increasingly popular. Because vulnerable home routers mask the target of an attack it is difficult for ISPs to determine the ultimate destination and recipient of huge waves of amplified traffic.

Traffic from amplification amounts to trillions of bytes a day disrupting ISP networks, websites and individuals. The impact on ISPs is fourfold:
  • Network impact generated by malicious traffic saturating available bandwidth
  • Cost impact generated by a spike in support calls caused by intermittent service disruption
  • Revenue impact as poor internet experience leads to increased churn or retention expenses
  • Reputation impact as unwanted traffic is directed toward peers.
"Existing in-place DDoS defenses do not work against todayís amplification attacks, which can be launched by any criminal who wants to achieve maximum damage with minimum effort," explained Sanjay Kapoor, SVP of Strategy, Nominum. "Even if ISPs employ best practices to protect their networks, they can still become victims, thanks to the inherent vulnerability in open DNS proxies."





Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victimís financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //