June 7, 2016 By Larry Loeb 2 min read

Akamai’s Security Intelligence Response Team (SIRT) recently issued an advisory warning for a new spate of distributed denial-of-service (DDoS) attacks leveraging the Trivial File Transfer Protocol (TFTP).

As of April 20, 2016, Akamai had mitigated 10 attacks that were using this method. It reported most of the campaigns consisted of multivector attacks that included TFTP reflection. The security firm also found indications that this method may have been integrated into at least one site offering DDoS-as-a-service.

Why the Trivial File Transfer Protocol?

According to Akamai, TFTP has been around for a long time. It was intended to be used for file transfers of firmware and configuration files, typically for networked devices. However, the simple design of the protocol omits features such as authentication and directory listing capabilities.

The attack engages TFTP servers connected to the internet. It makes a default request for a file, and the victim TFTP server returns data to the requesting target host as a result of this request regardless of a file name mismatch. It spends time performing a wasted effort, which is just what the attackers want to happen.

TFTP only sends out data in specific block sizes and requires acknowledgment of each block being received. Akamai explained that because the target of the DDoS attack will never acknowledge the data being exfiltrated, only the first block is sent. This mitigates the potential of higher amplification based on single requests.

Some observed attacks had several data blocks attached to them, which could have greatly increased how much wasted effort the TFTP server expended.

SecurityWeek noted that Akamai’s Jose Arteaga said a weaponized version of the TFTP attack script started circulating in March, around the same time the media began highlighting research into this attack.

A Simple Mitigation Technique

In its advisory, Akamai recommended a few mitigation techniques. “For those hosting TFTP servers, assess the need to have UDP port 69 exposed to the internet. This should be firewalled and only allowed to trusted sources,” it said.

Intrusion detection systems can also help flag suspicious activities on the network.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today