Loop DoS – New DoS Attack Targets Application-Layer Protocols, with Potential Impact on 300K Hosts
In a startling revelation, cybersecurity experts have uncovered a newly identified DoS loop attack, distinguished by its self-perpetuating nature and targeted approach toward application-layer messages. This sophisticated technique involves the pairing of two network services, triggering an endless exchange of responses that inundate systems or networks with overwhelming traffic, resulting in a denial of service. Once initiated, the loop operates autonomously, rendering even the attackers powerless to halt its disruptive effects.
Unlike previous loop attacks confined to the routing layer of a single network and limited by finite iterations, this latest threat poses a formidable challenge to cybersecurity defenses.
300,000 Vulnerable Hosts
The gravity of this discovery becomes apparent when considering its potential impact on an estimated 300,000 Internet hosts.
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Researchers Yepeng Pan and Professor Dr. Christian Rossow from CISPA have identified vulnerabilities in a range of widely used protocols, including TFTP, DNS, NTP, and legacy protocols such as Daytime, Time, Active Users, Echo, Chargen, and QOTD. These protocols, integral to basic Internet functionalities, serve essential roles like time synchronization and domain name resolution, making them prime targets for malicious exploitation.
Exploitation
What’s particularly concerning is the ease with which these attacks can be triggered, often requiring just a single spoofing-capable host. By leveraging IP spoofing, attackers can initiate a loop between vulnerable servers, perpetuating a cycle of traffic exchange that strains both systems and network links.
Trending: Major Cyber Attacks that shaped 2023
Trending: Recon Tool: SiCat