Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

DDoS Attacks Abuse TFTP for Reflection and Amplification

Several months ago, security researchers at Edinburgh Napier University published a paper on a distributed denial of service (DDoS) reflection and amplification method leveraging the TFTP (Trivial File Transfer Protocol) protocol, and security researchers at Akamai now warn of real-life attacks leveraging this technique.

Several months ago, security researchers at Edinburgh Napier University published a paper on a distributed denial of service (DDoS) reflection and amplification method leveraging the TFTP (Trivial File Transfer Protocol) protocol, and security researchers at Akamai now warn of real-life attacks leveraging this technique.

Usually performed by large botnets and typically executed from many sources, DDoS attacks can result in large traffic flows, but intermediate devices called amplifiers can also be used to amplify the attacker’s traffic. What Edinburgh Napier University researchers discovered was that TFTP can be leveraged for an amplification factor of approximately 60, which rates high alongside other methods.

In their paper, researchers Boris Sieklik, Richard Macfarlane, and William J. Buchanan also revealed that this amplification technique is a global issue, mainly because the protocol is used in around approximately 599,600 publicly open TFTP servers. Their study dates 2014, but it made it to the headlines only in March this year, when it was detailed in the Computers & Security journal.

However, Sieklik, Macfarlane, and Buchanan are not the first to suggest that TFTP servers can be abused for DNS amplification attacks, with Cisco Systems Threat Research Engineer Jaeson Schultz revealing this possibility in 2013. “Amplification within this protocol isn’t optimal for attackers, but if enough TFTP servers are publicly reachable this could still be an effective attack,” Schultz said.

On Wednesday, Akamai’s Security Intelligence Response Team (SIRT) revealed that 10 attacks leveraging TFTP were spotted starting on April 20, 2016, targeting the company’s customers. In an advisory, Akamai’s Jose Arteaga notes that a weaponized version of the TFTP attack script started circulating in March, seemingly coinciding “with media publications regarding the research into the possibility of this attack method.”

According to Arteaga, most of these incidents were multi-vector attacks that included TFTP reflection and says that there is indication that at least one site offering DDoS as a service has integrated this technique. While this attack method won’t generate a high packet rate, the generated volume may be enough to consume bandwidth at the target site, researchers say. They also explain that the attack tool uses about the same code as other UDP based reflection tools, and has a similar command line.

The profile of such an attack shows a peak bandwidth of 1.2 Gigabits per second, also peaking at 176.4 thousand packets per second. The TFTP reflection attack vector leverages port 69 as source port, researchers also say. However, it appears that these attacks usually ignored the port parameter and resulted in random ports.

This attack, however, is limited by the nature of TFTP, a protocol created to deliver files, mainly configuration files, to a limited number of hosts at a time. This means that TFTP servers might won’t be able to handle the large number of queries sent by the TFTP flood attack tool.

Advertisement. Scroll to continue reading.

“Alone, TFTP has produced a 1.2 Gbps attack but multi-vector campaigns, where TFTP is just one of many vectors, have peaked at just over 44 Gbps. So far, sources of TFTP reflection attacks collected during the early stages of attacks are poorly distributed. Mostly these are originating out of Asia with later attacks adding in sources from Europe,” the researcher says.

However, the researched recommends that all those hosting TFTP servers assess the need of exposing UDP port 69 to the Internet. The port should be firewalled and allowed only to trusted sources, and admins should also use tools to detect the abuse of TFTP servers in the network.

Related: WordPress Sites Used to Power Layer 7 DDoS Attacks

Related: DDoS Attacks Continue to Rise in Power and Sophistication

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...