October 23, 2016 By Russell Couturier 3 min read

Distributed denial-of-service (DDoS) attacks using authentic IoT devices are easy to detect based upon the extreme increase in traffic. However, they are one of the more difficult attacks to remediate. Remediation requires discerning authentic traffic from malicious traffic — all generated from authentic devices. An authentic device is an internet-enabled endpoint that has historically generated benign traffic.

The Domain Name System (DNS) DDoS attack that occurred on October 21 most likely used hijacked cameras, home automation devices and internet-enabled appliances by detecting factory-supplied passwords. They send an excessive amount of valid traffic with deterministic and nondeterministic intent.

Remediating an attack involves the detection of an extraneous number, or anomalous frequency of requests, by requesting devices and temporarily blacklisting those devices. You cannot permanently blacklist these devices, as they are authentic and potentially perform strategic security and safety functions. Likewise, geoblockers are not as effective in thwarting these attacks since they are hijacked authentic devices that are globally geolocated —hence the difficulty in remediation.

These attackers took a multiphased approach to accomplish their mission. First, they developed botnets to scan the internet in an attempt to find devices with factory-set passwords. Most of these devices are Linux-based, and it is fairly easy with root access to inject an executable to perform a continual stream of DNS requests. The botnets then infected the devices with this malicious application.

In parallel, botnets most likely probed DNS providers to see which providers would be susceptible to these types of attacks. This involved submitting micro-requests to providers to disclose if, how and at what threshold the provider blocked the requesting device. The knowledge of both susceptible devices and susceptible providers allowed the perfect medium for a successful attack.

DDoS attacks are usually short-lived and cause outages measured in hours; it takes a great deal of planning and work for a relatively short interruption. A malicious organization investing this much work would use its talent and resources for a more direct monetary compensation. This attack was most probably the work of a well-organized and directed group to ascertain the damage that could be caused by the disruption. These types of DDoS attacks could have significant effects in times of war, political campaigns, national emergencies, weather events and the like — that is, a malicious intent where a short-term disruption could have significant implications for people to communicate effectively.

Most likely the attackers did not reveal all the infected devices and will continue to supplement their inventory in preparation for an additional attack. So what can be done to prevent this in the future?

  1. IoT device manufacturers should require that factory passwords be updated on devices before they can be enabled.
  2. Service providers must have the flexibility to change and modify their systems quickly for different attack vectors. DNS service providers already have detection and remediation technologies. Unfortunately, the magnitude of the attack significantly changes the detection vectors; one thousand devices sending 500 DNS requests per minute have a very different attack vector than 400,000 devices sending 25 DNS requests per minute.
  3. The ability to detect DNS probing for malicious intent.
  4. Disclosure of the command-and-control (C&C) enterprise that controls the infected devices. All the infected devices most likely would periodically check with a centralized C&C authority to coordinate the attack. Global visibility of DNS traffic would enable the detection of a worldwide coordinated attack.

Finally, it is important that we do not blame DYN for poor security measures. This is one of the largest DDoS attacks using authentic systems that our industry has experienced. DYN was unfortunate to be the first vendor to experience an attack of this magnitude, requiring it to modify its detection and remediation technologies under duress. DYN performed remarkably to remediate this attack as quickly as it did based on the event’s significance. It is an exponential curve when relating the attack vectors to the remediation systems: The more geographically dispersed the devices are, the more authentic they are, and the lower the per-device threshold, the greater the difficulty in detection.

More from

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today