Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

DirtJumper DDoS Toolkit Variant Adds Mitigation Bypass Techniques

Researchers at Arbor Networks have uncovered a new variant of a notorious distributed denial-of-service (DDoS) toolkit has been bolstered with new DDoS mitigation defenses.

Researchers at Arbor Networks have uncovered a new variant of a notorious distributed denial-of-service (DDoS) toolkit has been bolstered with new DDoS mitigation defenses.

The new version of the Drive variant of the DirtJumper kit is the first piece of DDoS malware that Arbor Networks has seen that incorporates DDoS mitigation bypass techniques, explained Jason Jones, security research analyst with Arbor Networks’ ASERT team.   

“The attack sends an initial attack packet and then looks for either a Set-Cookie or a Location header and will parse out either the Cookie value or new URL location using those values in the next packet it sends,” blogged Jones. “It will also look for a meta equiv refresh tag, location= or document.location.href inside of the response from the server in an attempt to defeat mitigations using those countermeasures as well.”

“When parsing out the Set-Cookie header, there [are] a lot of convoluted calls to @LStrPos and @LStrLen as it searches for the relevant parts of the cookie value,” he continued. “Once all that is sorted, it will then store the cookie value in the global cookie array for the attack and that cookie value will be available to all subsequent requests sent to the server as part of the attack.”

“The other parsing mechanisms perform similarly with respect to redirects – they store the new location in the global variable so the next time the attack is run it will target the proper path,” he added. “It will also check for the existence of the mitigation options each time a request is sent. While this adds some overhead, it will also ensure that the attack packets have a high chance of getting through.”

After parsing out the appropriate value to bypass, the attack will build a new HTTP request to send and generate a new random User-Agent to be used in the new attack, Jones noted.

The developers did not stop there however. The variant also comes with three other new attacks as well: -icmp, -byte and –long. The –icmp attack sends a standard icmp echo request towards the target host. The byte attack meanwhile appears to be a variant of the –ip and –ip2 attacks where only one random lowercase alpha byte is sent before the socket is closed instead of the other payloads, Jones explained.  

“The -long attack is more interesting and as its name implies, attempts to keep a socket open for a long period of time while also sending a decent amount of data during that time,” Jones blogged. “A random payload is generated, sent and then randomly sleeps for 2 to 6 seconds before executing the send up to 10240 times. It seems unlikely that this attack will succeed for the maximum time as most services will close a socket upon receiving malformed data defined by their service, but it is possible some may not and allow the attack to continue long enough to exhaust available connections.”

Advertisement. Scroll to continue reading.

Security researchers have been tracking DirtJumper has been around for years, with its first known detection tracing back to January 2009.

“Just as the first version of Drive raised the bar for DirtJumper variants, this version looks to be raising the bar for DDoS malware in general with its purposeful attempts at bypassing mitigations with its new -smart attack,” Jones blogged. “We expect that this is just the first of many pieces of malware to attempt to incorporate these bypass techniques and also expect that Drive will continue to evolve and attempt to improve its techniques for such bypass attacks.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.