"New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems"

Researchers from the CISPA Helmholtz-Center for Information Security have detailed a new Denial-of-Service (DoS) attack vector that has been targeting application-layer protocols based on the User Datagram Protocol (UDP), threatening hundreds of thousands of hosts. According to the researchers, "Loop DoS attacks," pair servers of these protocols so that they can communicate with each other indefinitely. UDP is a connectionless protocol that does not validate source IP addresses, leaving it vulnerable to IP spoofing. Therefore, when attackers forge several UDP packets with a victim IP address, the destination server responds to the victim instead of the threat actor, resulting in a reflected DoS attack. New research discovered that certain UDP protocol implementations, such as DNS, NTP, TFTP, Active Users, Daytime, Echo, Chargen, QOTD, and Time, can be weaponized to create a self-perpetuating attack loop. This article continues to discuss the new Loop DoS attack.

THN reports "New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems"

Submitted by grigby1

Submitted by Gregory Rigby on