Massive 167Gbps DDoS attacks against Banking furthermore Financial Institutions
DDoS attackers attempted toward bring down an Banking services earlier this week using one regarding the largest Distributed denial regarding service attack using DNS reflection technique.
Prolexic, the global leader in Distributed Denial regarding Service (DDoS) protection services, announced that it has successfully mitigated the largest DNS reflection attack ever recorded, which peaked at 167 Gigabits per second (Gbps). The company did not name the target regarding the digital assault.
DNS-reflection was the attack method used in Operation Stophaus, an attack waged in March by The Spamhaus Project, a Geneva-based not-for-profit organization dedicated toward fighting Internet spam. When Spamhaus was assaulted by a vast 300Gbps peak DNS reflection attack, it engaged the help regarding a content delivery network (CDN) called CloudFlare toward help defend itself.
The DNS Reflection Denial regarding Service (DrDoS) technique exploits security weaknesses in the Domain Name System (DNS) Internet protocol. Using Internet protocol spoofing, the source address is set toward that regarding the targeted victim, which means all the replies will go toward the target.
The target regarding the attack receives replies from all the DNS servers that are used. This type regarding attack makes it very difficult toward identify the malicious sources.
Prolexic’s digital forensics confirmed that 92 percent regarding the machines participating in the attack were open DNS resolvers, sourcing from port 53, which represented a malformed DNS response. The security provider recommends that all organizations proactively validate their DDoS mitigation service toward reduce possible downtime, despite the size regarding the attack.
Many services can be exploited toward act as reflectors, some harder toward block than others. DNS amplification attack involve a new mechanism that increased the amplification effect, using a much larger list regarding DNS servers than seen earlier.-->