Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

New Application-Layer Loop DoS Attack: Impacts 3L Online System

admin by admin
Mar 21, 2024
in News
A A
0

Cybersecurity researchers have identified a new form of denial-of-service (DoS) attack that could disrupt over 300,000 internet-connected systems worldwide.

This novel attack, which targets the application layer of network communication, has raised significant concerns due to its self-perpetuating nature and the ease with which it can be executed.

Attack Description and Impact

The newly discovered DoS loop attack is a sophisticated cyber threat that exploits vulnerabilities in network protocols.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:


It initiates a self-sustaining cycle of communication between two network services, causing them to respond to each other indefinitely.

This relentless exchange generates overwhelming traffic, leading to a denial of service for the affected systems or networks.

Unlike previous loop attacks confined to the routing layer and with a limited number of iterations, this new attack operates at the application layer and can continue indefinitely once triggered.

The attack’s persistence means that even the attackers cannot halt the process once it has begun.

Vulnerable Protocols

The discovery was made by researchers Yepeng Pan and Professor Dr. Christian Rossow from the Center for IT-Security, Privacy, and Accountability (CISPA).

They have identified several widely-used protocols that are susceptible to this type of attack, including:

  • Trivial File Transfer Protocol (TFTP)
  • Domain Name System (DNS)
  • Network Time Protocol (NTP)
  • Daytime Protocol
  • Time Protocol
  • Active Users Protocol
  • Echo Protocol
  • Character Generator Protocol (Chargen)
  • Quote of the Day Protocol (QOTD)

These protocols serve essential functions on the internet, such as time synchronization (NTP), domain name resolution (DNS), and file transfers without authentication (TFTP).

Dawood Sajjadi, a prominent cybersecurity expert, recently tweeted about the “Loop DoS” attack which has affected hundreds of thousands of systems.

Academics discovered a new variation of the network loop attack that can crash servers by putting them in an infinite loop of data exchange. The new attack is named Loop DoS is a variation of classic network loops but one that takes place at the application layer instead of the… pic.twitter.com/sIgicckKao

— Dawood Sajjadi (داود سجادی) (@5tuxnet) March 21, 2024

Attack Execution and Detection

The attack can be initiated by a single host with the capability of time synchronization (NTP).

For example, an attacker could trigger a loop between two vulnerable TFTP servers by sending a single spoofed error message.

The servers would then be trapped in an endless exchange of error messages, straining the servers and any network links between them.

The researchers emphasize that the application-level loops they have uncovered are distinct from previously known network-layer loops.

Consequently, traditional packet lifetime checks that operate at the network level are ineffective at interrupting these application-layer loops.

Mitigation and Response

The ease with which these attacks can be carried out is alarming.

“As far as we know, this kind of attack has not yet been carried out in the field. However, it would be easy for attackers to exploit this vulnerability if no action were taken to mitigate the risk,” Rossow explains.

In response to their findings, the CISPA researchers took proactive measures.

In December 2023, they disclosed their discovery to the affected vendors and a trusted operator community.

They also coordinated the publication of an attack-specific advisory and initiated a notification campaign in collaboration with the Shadowserver Foundation.

The discovery of this new application-layer loop DoS attack is a stark reminder of the evolving nature of cyber threats.

The potential impact on thousands of internet hosts underscores the need for continuous vigilance and prompt action to secure network protocols against such vulnerabilities.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.