Blog Post

Better than Bot Takedowns

By Thomas Orthbandt

Posted on March 3, 2015 in: Network, Security

Tags: , ,

Europol recently took control of the ramnit botnet in order to disrupt more than 3.2 million infections around the world. Ramnit is a sophisticated bot that appeared in 2010 and spread quickly. It enables remote access to infected machines and can steal files and credentials. It can also monitor web browsing and even use stolen website cookies to impersonate victims. Internet users are nearly always unaware they have been infected by malware and usually not well equipped to deal with infections even when they are made aware. It is also not realistic to expect all bots will be taken down, in fact the reverse is true, few bots are.

Read more

Blog Post

DNS DDoS Takes Down Hong Kong Paper

By Thomas Orthbandt

Posted on October 2, 2014 in: Security

The ongoing protests in Hong Kong are attracting worldwide attention. Less visible is a connection to the ongoing DNS-based DDoS attacks that started early this year. On Sunday Sept 28 attackers used DNS based DDoS to target Passion Times, a local Hong Kong newspaper (http://www.passiontimes.hk/). The site was brought down for most of the day and had to resort to Facebook (https://www.facebook.com/passiontimes) in order to get the news out.

Read more

Blog Post

Response Rate Limiting Bites Back?

By Thomas Orthbandt

Posted on September 24, 2014 in: Security

A new kind of DDoS attack is currently stressing DNS infrastructure everywhere. Attackers gain access to DNS resolvers through home gateways with open DNS proxies. Proxies forward large bursts of queries with spoofed IP addresses to whatever resolver they are configured to use, usually an ISP resolver. With these attacks the overwhelming majority of queries require recursion so resolvers in turn query authoritative servers to get answers.

Read more

Blog Post

Digging Deep into DNS Data Discloses Damaging Domains

By Thomas Orthbandt

Posted on September 17, 2014 in: Security

A Terabyte stream of anonymized DNS data collected every day from around the world reveals lots of interesting things.  Nominum researchers have developed algorithms to sort through trillions of transactions and find what is usually a tiny fraction that aren’t legitimate.   Some are queries for controlling malware, some are to send spam, and most recently lots more queries are for DDoS.

Read more

Blog Post

Progress on Open Home Gateways

By Thomas Orthbandt

Posted on July 14, 2014 in: Network, Security

Tags: , ,

We’ve written extensively about open DNS proxies running in home gateways (“open home gateways”). Affected devices proxy DNS queries received on their WAN interface to whatever DNS resolver they are configured to use. This is typically the DNS configured by the ISP. The DNS has always been a handy tool for various kinds of attacks and the presence of these gateways gives attackers a back door into provider networks.

Read more

Blog Post

Deterring DNS Amplification: Considerations for Filtering at Network Borders

By Thomas Orthbandt

Posted on April 29, 2014 in: Security

Tags: ,

A new variant of DNS amplification attack relies on home gateways with open DNS proxies to forward DNS queries to ISP resolvers. To launch this exploit attackers can deploy their exploit code anywhere on the Internet that allows address spoofing, a compromised server in a hosting facility for example. From there DNS queries can be targeted at any network with open home gateways. These queries enter ISP networks at border routers.

Read more

Blog Post

Software is Strategic, Hardware is Generic

By Thomas Orthbandt

Posted on December 16, 2013 in: Network, Security

Tags: , ,

Network Functions Virtualization (NFV) is getting a lot of attention in Telecom circles these days.  Initiated by leading providers around the world the NFV effort now has more than 150 participants crossing all of the functional boundaries in networking.   NFV has been motivated by the astonishing array of appliances that have crept into provider networks.  Even DNS appliances have emerged but the value proposition is almost exclusively around convenience rather than optimizing DNS for carrier environments.

Read more

Blog Post

DNS Amplification Attacks: Out of sight, out of mind? Part Three

By Thomas Orthbandt

Posted on December 10, 2013 in: Security

Tags: ,

Previous posts (Part 1 and Part 2) offer background on DNS amplification attacks being observed around the world.   These attacks continue to evolve.  Early attacks focused on authoritative servers using “ANY” queries for domains that were well known to offer good amplification.  Response Rate Limiting (RRL) was developed to respond to these early attacks.  RRL, as the name suggests, is deployed on authoritative servers to rate limit responses to target names.  It basically groups requesters IP addresses (/24 for IPV4 and /56 for IPv6) together with the name and sends a truncated response to requests that exceed a configured limit.

Read more

Blog Post

DNS Amplification Attacks: Out of sight, out of mind? Part Two

By Thomas Orthbandt

Posted on September 3, 2013 in: Security

Tags: ,

This post follows an earlier post about DNS amplification attacks being observed around the world.  DNS Amplification Attacks are occurring regularly and even though they aren’t generating headlines targets have to deal with floods of traffic and ISP infrastructure is needlessly stressed – load balancers fail, network links get saturated, and servers get overloaded.  And far more intense attacks can be launched at any time.

Read more

Blog Post

DNS Amplification Attacks: Out of Sight, Out of Mind?

By Thomas Orthbandt

Posted on August 23, 2013 in: Security

Tags: ,

Geoff Huston’s recent post about the rise of DNS amplification attacks offers excellent perspective on the issue.  Major incidents like the Spamhaus attack Geoff mentions at the beginning of his post make headlines, but even small attacks create noticeable floods of traffic. These attacks are easy to launch and effective even with relatively modest resources and we see evidence they’re occurring regularly. Although DNS servers are not usually the target of these attacks the increase in traffic and larger response sizes typically stress DNS infrastructure and require attention from operation teams.

Read more

1 3 4 5 6 7 8