October 23, 2016 By Russell Couturier 3 min read

Distributed denial-of-service (DDoS) attacks using authentic IoT devices are easy to detect based upon the extreme increase in traffic. However, they are one of the more difficult attacks to remediate. Remediation requires discerning authentic traffic from malicious traffic — all generated from authentic devices. An authentic device is an internet-enabled endpoint that has historically generated benign traffic.

The Domain Name System (DNS) DDoS attack that occurred on October 21 most likely used hijacked cameras, home automation devices and internet-enabled appliances by detecting factory-supplied passwords. They send an excessive amount of valid traffic with deterministic and nondeterministic intent.

Remediating an attack involves the detection of an extraneous number, or anomalous frequency of requests, by requesting devices and temporarily blacklisting those devices. You cannot permanently blacklist these devices, as they are authentic and potentially perform strategic security and safety functions. Likewise, geoblockers are not as effective in thwarting these attacks since they are hijacked authentic devices that are globally geolocated —hence the difficulty in remediation.

These attackers took a multiphased approach to accomplish their mission. First, they developed botnets to scan the internet in an attempt to find devices with factory-set passwords. Most of these devices are Linux-based, and it is fairly easy with root access to inject an executable to perform a continual stream of DNS requests. The botnets then infected the devices with this malicious application.

In parallel, botnets most likely probed DNS providers to see which providers would be susceptible to these types of attacks. This involved submitting micro-requests to providers to disclose if, how and at what threshold the provider blocked the requesting device. The knowledge of both susceptible devices and susceptible providers allowed the perfect medium for a successful attack.

DDoS attacks are usually short-lived and cause outages measured in hours; it takes a great deal of planning and work for a relatively short interruption. A malicious organization investing this much work would use its talent and resources for a more direct monetary compensation. This attack was most probably the work of a well-organized and directed group to ascertain the damage that could be caused by the disruption. These types of DDoS attacks could have significant effects in times of war, political campaigns, national emergencies, weather events and the like — that is, a malicious intent where a short-term disruption could have significant implications for people to communicate effectively.

Most likely the attackers did not reveal all the infected devices and will continue to supplement their inventory in preparation for an additional attack. So what can be done to prevent this in the future?

  1. IoT device manufacturers should require that factory passwords be updated on devices before they can be enabled.
  2. Service providers must have the flexibility to change and modify their systems quickly for different attack vectors. DNS service providers already have detection and remediation technologies. Unfortunately, the magnitude of the attack significantly changes the detection vectors; one thousand devices sending 500 DNS requests per minute have a very different attack vector than 400,000 devices sending 25 DNS requests per minute.
  3. The ability to detect DNS probing for malicious intent.
  4. Disclosure of the command-and-control (C&C) enterprise that controls the infected devices. All the infected devices most likely would periodically check with a centralized C&C authority to coordinate the attack. Global visibility of DNS traffic would enable the detection of a worldwide coordinated attack.

Finally, it is important that we do not blame DYN for poor security measures. This is one of the largest DDoS attacks using authentic systems that our industry has experienced. DYN was unfortunate to be the first vendor to experience an attack of this magnitude, requiring it to modify its detection and remediation technologies under duress. DYN performed remarkably to remediate this attack as quickly as it did based on the event’s significance. It is an exponential curve when relating the attack vectors to the remediation systems: The more geographically dispersed the devices are, the more authentic they are, and the lower the per-device threshold, the greater the difficulty in detection.

More from

How cyber criminals are compromising AI software supply chains

3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important.Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to be a hacktivist organization motivated by an anti-AI cause, specifically targets these resources to poison data sets used in AI model training.No matter whether you use…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Getting “in tune” with an enterprise: Detecting Intune lateral movement

13 min read - Organizations continue to implement cloud-based services, a shift that has led to the wider adoption of hybrid identity environments that connect on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices in these hybrid identity environments, Microsoft Intune (Intune) has emerged as one of the most popular device management solutions. Since this trusted enterprise platform can easily be integrated with on-premises Active Directory devices and services, it is a prime target for attackers to abuse for conducting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today