SUBSCRIBE

Rio Games faced olympic-sized DDoS attacks

Major public events with an online presence โ€” like political or IT conventions and sports championships โ€” can be targets for criminals or attention-seekers, so CISOs donโ€™t like to tip off potential attackers how they defend their networks.

However after the events sometimes vendors give a peek at what went on. Thatโ€™s the case with Arbor Networks, whose denial of service mitigation products were used by last monthโ€™s 2016 Rio Olympic Games to help protect the IT infrastructure.

In a blog Wednesday the company said the network faced DDoS attacks leveraging an Internet of Things-based botnet before and during the Games of up toย 540gb/sec atย public-facing properties and organizations affiliated with the Olympics such as Brazilian banks and telcos.

โ€œA large proportion of the attack volume consisted of UDP reflection/amplification attack vectors such as DNS, chargen, ntp, and SSDP, along with direct UDP packet-flooding, SYN-flooding, and application-layer attacks targeting Web and DNS services,โ€ the company said.

The particular botnet used is calledย LizardStresser, the company outlined in a separate blog.ย The code for it was released last year by the developer(s), allowing others who want to make use of DDoS attacks to build a botnet of their own. Some are using IoTย devices โ€” including Webcams โ€” to build a network by taking advantage of shared default passwords many of these devices have. The LizzardStresser framework includes the ability to search for random IP addresses and a brute-force password-breaking capability that also includes a list of passwords to try first.

Some of those include the usual suspects, like admin, password, 1234, user, guest, login. Somehow the IT industry has to find a way to ensure organizations canโ€™t use these and other obvious passwords on hardware.

Typically the botnetโ€™s client runs on compromised Linux machines which connect to a hardcoded command and control server. The protocol is essentially a lightweight version of IRC chat. Infected clients will connect to the server and receive commands.

โ€œThe threat actors appeared to quickly evolve their tactics minute-by-minute, switching between a HOLD flood to UDP flooding and TCP flooding with a variety of flags,โ€ says Arbor. โ€œThis was likely the threat actors tuning their attacks for maximum impact. The UDP-based portions of the attack were further characterized as originating from UDP high-ports to destination port UDP/443 with a packet size of ~1400 bytes.โ€

LizardStresser is becoming the โ€œbotnet-du-jour for IOT devices.โ€ Arbor warns, because it is for threat actors to make minor tweaks to telnet scanning. โ€œWith minimal research into IOT device default passwords, they are able to enlist an exclusive group of victims into their botnets.โ€

Tech Jobs

Categories