Attackers using new technique to bring down websites

connected world
Network Time gentlemen, please

Earlier this week a number of high-profile gaming services were taken down by distributed denial-of-service attacks (DDoS) that used a technique not seen before.

Instead of directly flooding the targeted services with torrents of data, an attack group calling itself DERP Trolling sent smaller-sized data requests to time-synchronisation servers running the Network Time Protocol.

They manipulated these requests to seem like they were originating from the gaming sites they intended to attack. This resulted in an amplified response, one request containing 8 bytes and was increased to one of 467 bytes, an increase of more than 58 times.

"Prior to December, an NTP attack was almost unheard of because if there was one it wasn't worth talking about," Shawn Marck, CEO of DoS-mitigation service Black Lotus, said. "It was so tiny it never showed up in the major reports. What we're witnessing is a shift in methodology."

Three times the effect

NTP reflection accounted for about 69 per cent of all DoS attack traffic by bit volume. The average size of these attacks was 7.3 gigabits per second, more than three times the average DDoS attack observed in December.

NTP servers help people synchronize their servers to very precise time increments. Recently, the protocol was found to suffer from a condition that could be exploited by DoS attackers. Luckily, NTP-amplification attacks are easy to repel, since virtually all NTP traffic can be blocked without any major negative consequences to the targeted site.

Black Lotus recommends network operators follow several practices to blunt the effects of NTP attacks. They include using traffic policers to limit the amount of NTP traffic, implementing large-scale DDoS mitigation systems, or opting for service-based approaches that provide several gigabits of standby capacity for use during DDoS attacks.

Latest in Security
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Image depicting a hand on a scanner
Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
Latest in News
Seth Milchick and Kier Eagan's animatronic speaking in Severance season 2 episode 10
Apple TV+ announces Severance has been renewed for season 3 after that devastating finale
Spotify's new Concerts Near You playlist feature showing a list of songs by local touring artists
Spotify has launched a new Concerts Near You playlist, making it easier for you to see if your favorite artists are performing in your area
The new Dr. Squatch Call of Duty collection.
Latest Call of Duty collaboration finally lets you rub your body with Soap - and I can't believe I just wrote that
Nanoleaf PC Screen Mirror Lightstrip set up on gaming PC
This Nanoleaf light strip adds Ambilight-style illumination to your gaming setup – and it's amazingly cheap
The Samsung Galaxy S21 series of phones lying face down.
Samsung announces One UI 7 is coming to older phones after all, but the launch is still a mess
Using Zipped files and folders in Windows 11
Windows 11 should soon be faster at extracting files from compressed ZIPs – and it’s about time, frankly