Distributed denial-of-service (DDoS) attacks using authentic IoT devices are easy to detect based upon the extreme increase in traffic. However, they are one of the more difficult attacks to remediate. Remediation requires discerning authentic traffic from malicious traffic — all generated from authentic devices. An authentic device is an internet-enabled endpoint that has historically generated benign traffic.

The Domain Name System (DNS) DDoS attack that occurred on October 21 most likely used hijacked cameras, home automation devices and internet-enabled appliances by detecting factory-supplied passwords. They send an excessive amount of valid traffic with deterministic and nondeterministic intent.

Remediating an attack involves the detection of an extraneous number, or anomalous frequency of requests, by requesting devices and temporarily blacklisting those devices. You cannot permanently blacklist these devices, as they are authentic and potentially perform strategic security and safety functions. Likewise, geoblockers are not as effective in thwarting these attacks since they are hijacked authentic devices that are globally geolocated —hence the difficulty in remediation.

These attackers took a multiphased approach to accomplish their mission. First, they developed botnets to scan the internet in an attempt to find devices with factory-set passwords. Most of these devices are Linux-based, and it is fairly easy with root access to inject an executable to perform a continual stream of DNS requests. The botnets then infected the devices with this malicious application.

In parallel, botnets most likely probed DNS providers to see which providers would be susceptible to these types of attacks. This involved submitting micro-requests to providers to disclose if, how and at what threshold the provider blocked the requesting device. The knowledge of both susceptible devices and susceptible providers allowed the perfect medium for a successful attack.

DDoS attacks are usually short-lived and cause outages measured in hours; it takes a great deal of planning and work for a relatively short interruption. A malicious organization investing this much work would use its talent and resources for a more direct monetary compensation. This attack was most probably the work of a well-organized and directed group to ascertain the damage that could be caused by the disruption. These types of DDoS attacks could have significant effects in times of war, political campaigns, national emergencies, weather events and the like — that is, a malicious intent where a short-term disruption could have significant implications for people to communicate effectively.

Most likely the attackers did not reveal all the infected devices and will continue to supplement their inventory in preparation for an additional attack. So what can be done to prevent this in the future?

  1. IoT device manufacturers should require that factory passwords be updated on devices before they can be enabled.
  2. Service providers must have the flexibility to change and modify their systems quickly for different attack vectors. DNS service providers already have detection and remediation technologies. Unfortunately, the magnitude of the attack significantly changes the detection vectors; one thousand devices sending 500 DNS requests per minute have a very different attack vector than 400,000 devices sending 25 DNS requests per minute.
  3. The ability to detect DNS probing for malicious intent.
  4. Disclosure of the command-and-control (C&C) enterprise that controls the infected devices. All the infected devices most likely would periodically check with a centralized C&C authority to coordinate the attack. Global visibility of DNS traffic would enable the detection of a worldwide coordinated attack.

Finally, it is important that we do not blame DYN for poor security measures. This is one of the largest DDoS attacks using authentic systems that our industry has experienced. DYN was unfortunate to be the first vendor to experience an attack of this magnitude, requiring it to modify its detection and remediation technologies under duress. DYN performed remarkably to remediate this attack as quickly as it did based on the event’s significance. It is an exponential curve when relating the attack vectors to the remediation systems: The more geographically dispersed the devices are, the more authentic they are, and the lower the per-device threshold, the greater the difficulty in detection.

More from

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort.Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker is cracking…

Operational Technology: The evolving threats that might shift regulatory policy

Listen to this podcast on Apple Podcasts, Spotify or wherever you find your favorite audio content. Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022 — a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure. Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are…

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them.ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge.Understanding Attack Surface ManagementHere are some key…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor for…