New DDoS Attacks Use Far Fewer Infected Hosts

Akamai Technologies has identified a new attack method generating extremely large distributed denial of service (DDoS) attacks against educational institutions and other types of organizations but without the millions of infected hosts typically seen in these scenarios. In a threat advisory recently published by the content delivery network company's security intelligence response team, researchers described a reflection and amplification method that can produce "significant attack bandwidth" through "significantly fewer hosts." What's required are open ports allowing LDAP traffic.

The company's security experts have detected and mitigated a total of 50 Connection-less Lightweight Directory Access Protocol (CLDAP) reflection attacks. CLDAP was intended as an "efficient alternative to LDAP queries done over Transmission Control Protocol (TCP).

Most of the attacks seen in the wild used CLDAP reflection exclusively. Twice, education has been the target. However, the primary victims have been in the software and technology industry, where 21 attacks have taken place, and the gaming segment, which has had 15 attacks.

The largest of the attacks hit its target with a peak bandwidth of 24 gigabits per second and a top count of packets per second of 2 million. The source port was 386, the port used by Lightweight Directory Access Protocol (LDAP).

According to the report, signatures of the attack suggest that it's "capable of impressive amplification." For example, Akamai security people obtained sample malicious LDAP reflection queries that had a payload of only 52 bytes. Yet the attack data payload was 3,662 bytes, meaning that the amplification factor was 73. More typically, the average amplification rate was 57, according to the researchers.

The attacks are launched using "attack scripts," usually written in C and with only slight variations from one vector to another. When the script is run, the target IP becomes the source of all the 52-byte query payloads. These are then sent rapidly to every server in the supplied reflector list. From there, the CLDAP servers do as they're designed and reply to the query. As a result, the report described, "the target of this attack must deal with a flood of unsolicited CLDAP responses."

The attack is "fueled" by the number of servers on the internet with port 389 open and listening. Once a server has been identified as a viable source, it's added to the list of reflectors. The best mitigation, suggested the report, is to filter the port in question. "Ingress filtering of the CLDAP port from the internet will prevent discovery and subsequent abuse of this service," the report noted. Another option is to apply rules, which won't stop the outbreak, but will alert system administers when an attempt is made to use the systems as part of a reflection attack.

The report, "CLDAP Reflection DDoS" is available from Akamai's dropbox account here.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • digital classroom interface with virtual hand icons raised, representing students participating in an online poll

    Boosting Student Engagement with Interactive and Practical Teaching Methods

    Traditional teaching methods like slide-to-slide PowerPoint presentations no longer engage students in the way they used to. Here's how one educator developed engaging, interactive methods to help students grasp complex concepts.

  • Stock market graphs and candlesticks breaking apart with glass-like cracks

    Chinese Startup DeepSeek Disrupts AI Market

    A new low-cost Chinese artificial intelligence model is wreaking havoc in the technology sector, with tech stocks plummeting globally as concerns grow over the potential disruption it could cause.

  • Two autonomous AI figures performing tasks in a tech environment; one interacts with floating holographic screens, while the other manipulates digital components

    Agentic AI Named Top Tech Trend for 2025

    Agentic AI will be the top tech trend for 2025, according to research firm Gartner. The term describes autonomous machine "agents" that move beyond query-and-response generative chatbots to do enterprise-related tasks without human guidance.

  • interconnected cloud icons with glowing lines on a gradient blue backdrop

    Report: Cloud Certifications Bring Biggest Salary Payoff

    It pays to be conversant in cloud, according to a new study from Skillsoft The company's annual IT skills and salary survey report found that the top three certifications resulting in the highest payoffs salarywise are for skills in the cloud, specifically related to Amazon Web Services (AWS), Google Cloud, and Nutanix.