• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Corero Issues a “Kill Switch” Against MemCaching DDoS Attacks

March 10, 2018 By TheNewsTeam

Researchers at DDoS protection firm Corero Network Security have released a post stating that the memcached amplification attacks that hit GitHub and other networks over the last week with the largest ever DDoS attacks can be disarmed with a practical “kill switch”.

Corero says its kill switch issues a “flush all” command to the attacking server, which overpowers the flood of traffic by nullifying a vulnerable memcached server’s cache, including the large, possibly malicious payload planted there by attackers. Corero says they have tested the countermeasure quench packet and it “appears to be 100% effective”, and does not appear to lead to any collateral damage. The security firm has disclosed the countermeasure to national security agencies for immediate action.

According to various sources, there are up to 100,000 exposed memcached servers despite repeated warnings by the memcached developer community and large IT vendors about security risks. Memcached servers were not designed to be exposed to the Internet as authentication is not required in their use. Default configurations for some of the largest operating systems and cloud computing services actually enable permanent access to memcaching and customers’ private data.

An urgent fix is necessary. The attacks began in late February, and security firms warn that they are likely to continue and grow in size while the vulnerable memcached servers remain exposed to the public Internet.

Corero researchers found that any exposed Memcached server that can be leveraged for a DDoS attack can also be fooled into sharing user data it has cached from a local network or host. Anything added to a vulnerable server can be stolen because of the lack of checks. Attackers can also alter data and reinsert it in the cache without knowledge of the owner.

Ashley Stephenson, CEO at Corero, says: “While this blatant lapse of security is relatively clear to the accomplished security practitioner or hacker, it is not known to the increasingly business-oriented, non-technical user who is clickin

g a button to set up a new server in the cloud. There are dozens of US-CERT CVE and obscure security warnings related to Memcached but few of them address the clearly obvious issue of leaving the front door open on the internet for anyone to come in and take your data.”

Filed Under: Corero Network Security, MemCached DDoS Tagged With: Amplification Attacks, Ashley Stephenson, Corero, Corero kill switch, MemCached DDoS, memcached servers, record-breaking attacks

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.