Porn site feud spawns new DNS attack

Botnet operators are adding code to launch a new type of distributed denial of service attack, security experts warn.

A scrap between two pornographic Web sites turned nasty when one figured out how to take down the other by exploiting a previously unknown quirk in the Internet's Domain Name System (DNS).

The attack is known as DNS Amplification. It has been used sporadically since December, but it started getting talked about last month when ISPrime, a small New York Internet service provider, started getting hit hard with what's known as a distributed denial of service (DDOS) attack. The attack was launched by the operator of a pornographic Web site who was trying to shut down a competitor, hosted on ISPrime's network, according to Phil Rosenthal, the company's chief technology officer.

The attack on ISPrime started on the morning of Sunday, Jan. 18. It lasted about a day, but what was remarkable was that a relatively small number of PCs were able to generate a very large amount of traffic on the network.

One day later, a similar attack followed, lasting three days. Before ISPrime was able to filter the unwanted traffic, attackers were able to use up about 5GB/second of the company's bandwidth,

With a bit of work, Rosenthal's staff was able to filter out the hostile traffic, but in an e-mail interview he said that the attack "represents a disturbing trend in the sophistication of denial of service attacks."

According to Don Jackson, director of threat intelligence at security vendor SecureWorks, we may soon see a lot more of these DNS Amplification attacks. Late last week, the botnet operators, who rent out their networks of hacked computers to the highest bidder, started adding custom DNS Amplification tools to their networks.

"Everyone's picked it up now," he said. "The next big DDOS on some former Soviet republic, you'll see this mentioned, I'm sure."

One of the things that makes a DNS amplification attack particularly nasty is the fact that by sending a very small packet to a legitimate DNS server, say 17 bytes, the attacker can then trick the server into sending a much larger packet -- about 500 bytes --- to the victim of the attack. By spoofing the source of the packet, the attacker can direct it at specific parts of his victim's network.

Jackson estimates that the 5GB/second attack against ISPrime was achieved with just 2,000 computers, which sent out spoofed packets to thousands of legitimate nameservers, all of which started flooding the ISPrime network. ISPrime's Rosenthal says that about 750,000 legitimate DNS servers were used in the attack on his network.

Earlier this week, SecureWorks produced a technical analysis of the DNS Amplification attack.

The attack is generating a lot of discussion amongst DNS experts, according to Duane Wessels, program manager with DNS-OARC (Operations Analysis and Research Center), based in Redwood City, California.

"The worry is that this kind of attack could be used on more high-profile targets," he said.

One of the things that makes the attack particularly nasty is that it's very hard to protect against.

"As far as I know, the only real defense you have is to ask your upstream provider to filter [the malicious traffic]," he said. "It's not something the victim can do by themselves. They need cooperation from the provider."

The DNS system, a kind of directory assistance service for the Internet, has come under increased scrutiny over the past year, when hacker Dan Kaminsky discovered a serious flaw in the system. That flaw, which has now been patched by makers of DNS software, could be exploited to silently redirect Internet traffic to malicious computers without the victim's knowledge.

DNS-OARC has published some information on how to prevent BIND DNS servers from being used in one of these attacks. Microsoft was unable to immediately provide information on how to mitigate this particular attack on its own products, but its guidance on deploying secure DNS servers can be found here.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags denial of service

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert McMillan

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?