Researchers at Akamai firm have observed an increase of new reflection and amplification DDoS attacks exploiting Internet of Things devices (e.g. SOHO devices, routers, media servers, web cams, smart TVs and printers), which that misuses communications protocols. The data is in line with the findings of the report recently issued by Arbor Networks related to DDoS attack observed in Q3 2014.
As explained in the report issued by Akamai, the SSDP protocol abused by threat actors are ordinary used by such devices to communicate each other and to coordinate activities with various equipments. The IoT devices exposed on the Internet are targeted by bad actors that compromise them to coordinate major attacks against enterprise targets.
“PLXsert has observed the use of a new reflection and amplification distributed denial of service (DDoS) attack that abuses the Simple Service Discovery Protocol (SSDP). This protocol is part of the Universal Plug and Play (UPnP) Protocol standard. SSDP comes enabled on millions of home and office devices” states the report from Akamai.
The experts discovered an amazing number of Internet-facing UPnP devices that are potentially vulnerable to cyber attacks, more than 4.1 million units that threat actors could compromise them and recruit these resources in reflection DDoS attack.
“Malicious actors are using this new attack vector to perform large-scale DDoS attacks. The Prolexic Security Engineering & Response Team (PLXsert) began seeing attacks from UPnP devices in July, and they have become common,” said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai. The number of UPnP devices that will behave as open reflectors is vast, and many of them are home-based Internet-enabled devices that are difficult to patch. Action from firmware, application and hardware vendors must occur in order to mitigate and manage this threat,”
It has been estimated that nearly 38 percent of the 11 million devices deployed worldwide are at risk. Experts at Akamai have shared a list of potentially exploitable UPnP devices with other experts in an effort to collaborate with cleanup and mitigation efforts of this threat.
“The Simple Object Access Protocol (SOAP) is used to deliver control messages to UPnP devices and pass information back from the devices. Attackers have discovered that SOAP requests can be crafted to elicit a response that reflects and amplifies a packet, which can be redirected towards a target. By employing a great number of devices, attackers create large quantities of attack traffic that can be aimed at selected target” states the report.
How does the DDoS attack against the UPnP devices work?
The analysis of the Geographic distribution of vulnerable UPnP devices reveals that Korea is the country with the largest number of units, followed by the U.S., Canada, China, Argentina and Japan.
Recently security experts at Akamai have spotted a new malware kit named Spike which is used by bad actors to run DDoS attacks through desktops and Internet of Things devices.
“These attacks are an example of how fluid and dynamic the DDoS crime ecosystem can be,” explained Scholly. “Malicious actors identify, develop and incorporate new resources and attack vectors into their arsenals. It’s predictable that they will develop, refine and monetize these UPnP attack payloads and tools in the near future.”
As discussed in the last 2015 Europol-INTERPOL cybercrime conference IoE is a paradigm that most of all could be exploited by a cybercrime syndicate in the next future.
The complete report could be download here.
(Security Affairs – DDoS, Akamai)