{"id":11649,"date":"2018-03-03T09:00:05","date_gmt":"2018-03-03T17:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/03\/news-5420\/"},"modified":"2018-03-03T09:00:05","modified_gmt":"2018-03-03T17:00:05","slug":"news-5420","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/03\/news-5420\/","title":{"rendered":"Our Exposed World \u2013 Old exposures, new attacks"},"content":{"rendered":"<p><strong>Credit to Author: Natasha Hellberg (Senior Threat Researcher)| Date: Sat, 03 Mar 2018 16:28:01 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"181\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-300x181.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-300x181.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-768x464.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-640x387.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-440x266.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-380x230.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151.jpg 860w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Natasha Hellberg, Senior Threat Researcher FTR<\/p>\n<p><strong><em>With assistance from William Gamazo Sanchez, DSLabs<\/em><\/strong><\/p>\n<p>Within the last few days a new player has been introduced into the distribute denial of service (DDoS) amplification attack world and with it brings the potential for much larger DDoS attacks than what we have seen in the past. While most of us think DNS, UpNP\/SDP and NTP when we think of protocols that are used in DDoS, <strong>memcache<\/strong> has emerged as just as potent of a protocol by which to commit these kinds of attacks. <a href=\"https:\/\/github.com\/memcached\/memcached\/blob\/master\/doc\/protocol.txt\">Memcache<\/a> is a protocol meant to allow for the quick storage and retrieval of data from a server, without all the messy overhead of a database on the back end. Unfortunately, it also has recently been discovered that it makes a great source of amplification and reflection for DDoS.<\/p>\n<p>Within the last few days, <a href=\"https:\/\/blog.cloudflare.com\/memcrashed-major-amplification-attacks-from-port-11211\/\">Cloudflare<\/a> and <a href=\"https:\/\/githubengineering.com\/ddos-incident-report\/\">Github<\/a> have become the first victims of this new DDoS amplification method. In the case of Github, their network telemetry from <a href=\"https:\/\/blogs.akamai.com\/2018\/03\/memcached-fueled-13-tbps-attacks.html\">Akamai<\/a> indicates at least one wave of the attack hit over 1.35Tbps inbound at their servers:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-540771\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-1024x389.jpg\" alt=\"\" width=\"1024\" height=\"389\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-1024x389.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-300x114.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-768x291.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-640x243.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-900x342.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-440x167.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog-380x144.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog.jpg 1357w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center\"><em>Figure 1: From https:\/\/githubengineering.com\/DDoS-incident-report\/<\/em><\/p>\n<p>Now keep in mind that some of this traffic isn\u2019t attack traffic per se, but additional overhead from networking (handshaking attempts, etc.), in the end it still holds a significant punch. Just to put this in perspective, according to the Akamai SIRT, this attack was twice the size of what was seen for the <a href=\"https:\/\/blog.trendmicro.com\/dyn-servers-attacked-hackers-means-iot\/\">Mirai<\/a> attacks in Sept 2016.<\/p>\n<p>Using memcached is actually pretty easy. You send it a key, it sends you back the data associated with that key. And an added benefit is being able to put as many queries into a single request as you\u2019d like.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-540772\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-1024x687.jpg\" alt=\"\" width=\"1024\" height=\"687\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-1024x687.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-300x201.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-768x515.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-125x85.jpg 125w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-640x429.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-900x604.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-440x295.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1-380x255.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog1.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center\"><em>Figure 2:Creating a memcache attack<\/em><\/p>\n<p>In the current attacks, the attackers are making GETS requests against the memcache service to grab whatever data they can on existing keys (steps 3 &amp; 4 in figure 2); however, in many cases the memcache servers are not secured and also allow SET commands (aka putting data INTO the memcache server).\u00a0 The bad actors can use this to set a key to the maximum data blob allowed, and then make their GETS query to that specific key (steps 1-4 in Figure 2) to maximize the size of their reflection attack against the victim.<\/p>\n<p>While memcache can be installed both in TCP (natively) and UDP, these attacks will be primarily found on UDP Port 11211 as the UDP protocol allows for much easier spoofing of the source address, making it more attractive for reflection type DDoS attacks.<\/p>\n<p>Of the 120,458 (at the time of writing of this blog) memcache servers globally, there are just under 10k servers running memcache on UDP according to Shodan. It is more interesting to note that <u>almost one third of these are being seen in active attacks already<\/u>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-540773 size-full\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog2.jpg\" alt=\"\" width=\"475\" height=\"414\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog2.jpg 475w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog2-300x261.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog2-440x383.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/blog2-380x331.jpg 380w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/p>\n<p>Now, a key factor in the amplification value of memcache has to do with the data blob returned. Generally speaking, the max byte size for these is relatively small, but in some hosting provider space it can be seen that their memcache configuration allows for much larger data blobs (in some cases over 100G), thus increasing their value in a DDoS amplification attack.<\/p>\n<p>This being said, there are a number of caveats and limitations to the size these attacks might grow to. First and foremost, they are inhibited by the links attached to memcached server being used to reflect the attack. A 1Gbps link is only ever going to send 1Gbps no matter how big of a data blob is created by the attack. Ditto for the network card. And finally, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/User_Datagram_Protocol\">protocol only allows for two eight byte network sequence number<\/a>s (the data blob has to be broken into pieces to be sent across the internet \u2013 the sequence numbering allows the other end to know how to put it all back together again (like humpty dumpty!). But with only two bytes that means the maximum number of packets the protocol can return is 65,536 and even I can do the math to say the max size of a single packet is <a href=\"https:\/\/www.arbornetworks.com\/blog\/asert\/memcached-reflection-amplification-description-ddos-attack-mitigation-recommendations\/\">1428<\/a>, so that the total volume can only ever be 93.58 megabytes, transmitted across the link speed of the server being reflected off of. Or in other words, as a much wiser colleague pointed out \u2013 the request \/ GETS part can be super large, but it then becomes capped because of the limitations of the packet sequencing. This also begs the question, how does memcached handle data blobs that require sequencing higher than its standard allows for, since handling of these packets does not appear to be specified in the protocol.\u00a0 Its these questions that I would love more information on.<\/p>\n<p>So, in the end, is the sky falling? Will the internet bottom out? No.\u00a0 Notwithstanding we are still in the early days of understanding the technical potential of this new attack vector, even with NDP, SSDP, and DNS amplification attacks we did not see a constant barrage of large scale DDoS attacks, and it is unlikely to be the case with memcached either. However, will we see a growth in the size of DDoS attacks when they happen? In all likelihood, yes. As such, just like with other denial of service attacks, here\u2019s what you should do:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Read up on memcache attacks (both <a href=\"https:\/\/www.arbornetworks.com\/blog\/asert\/memcached-reflection-amplification-description-ddos-attack-mitigation-recommendations\/\">Arbor<\/a> and <a href=\"http:\/\/blog.netlab.360.com\/memcache-ddos-a-little-bit-more-en\/\">360 Netlab<\/a> have excellent analysis of these attacks)<\/li>\n<li>Ensure your networks have good traffic monitoring (both in and outbound!) using Trend <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network.html\">network intrusion tools<\/a> (like DDI and TippingPoint)<\/li>\n<li>Ensure you have more than one upstream provider so you can fail over to other links should the primary become flooded<\/li>\n<li>Ensure your network providers have implemented anti-spoofing (such as BCP38 &amp; 84) to ensure spoofed packets such as those used in DDoS reflection attacks do not make it to your network in the first place!<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"lightTable\">\n<p><em>As part of looking into this attack vector, several members of the security community assisted. I would like to say thanks to these folks, along specifically with both <strong>Damien Menscher<\/strong> of <strong>Google<\/strong> for his assistance in understanding the protocol and interaction as attack traffic, and <strong>John Matherly <\/strong>of <strong>Shodan <\/strong>for assistance with assessing the global impact.<\/em><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/blog.trendmicro.com\/exposed-world-old-exposures-new-attacks\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Natasha Hellberg (Senior Threat Researcher)| Date: Sat, 03 Mar 2018 16:28:01 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"181\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-300x181.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-300x181.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-768x464.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-640x387.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-440x266.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151-380x230.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/ransomware-response-study-showcase_image-4-w-1151.jpg 860w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Natasha Hellberg, Senior Threat Researcher FTR With assistance from William Gamazo Sanchez, DSLabs Within the last few days a new player has been introduced into the distribute denial of service (DDoS) amplification attack world and with it brings the potential for much larger DDoS attacks than what we have seen in the past. While most&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[714],"class_list":["post-11649","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11649"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11649\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}