Thursday, January 30, 2025
HomeCyber AttackNew Application-Layer Loop DoS Attack - 300,000 Online Systems At Risk

New Application-Layer Loop DoS Attack – 300,000 Online Systems At Risk

Published on

SIEM as a Service

Follow Us on Google News

Denial-of-service (DoS) attacks are usually exploited by hackers to interrupt regular network and website functioning, with motives of making money or for political reasons or simply to create a mess. 

The websites or networks can be made unavailable through the Denial of Service (DoS) attack method which sends numerous requests for resources and traffic to the system.

Researchers at CISPA Helmholtz-Center for Information Security discovered a new Denial-of-Service attack vector called “Application-layer Loop DoS Attacks.” 

It targets UDP-based application protocols by pairing their servers to communicate indefinitely, affecting both legacy protocols like QOTD, Chargen, and Echo and contemporary ones like DNS, NTP, and TFTP. 

This vulnerability puts an estimated 300,000 Internet hosts and networks at risk of denial-of-service conditions.

Loop DoS Attack

Loop DoS Attack

The newly discovered self-perpetuating DoS loop attack targets application-layer messages by pairing two network services that keep responding indefinitely, creating large traffic volumes resulting in denial of service. 

Once triggered, even attackers cannot stop it. Previously, loop attacks occurred on routing layers with finite iterations. 

This attack by CISPA researchers concerns 300,000 Internet hosts, confirming vulnerabilities in TFTP, DNS, NTP, and six legacy protocols providing basic Internet functionalities like time synchronization, name-to-IP mapping, and unauthenticated file transfer.

Application-layer loop DoS attacks employ IP spoofing, enabling initiation from a single spoofing-capable host. 

For example, attackers could trigger a perpetual loop between two vulnerable TFTP servers by injecting one spoofed error message, causing them to exchange error messages and stress networks between them endlessly. 

These attacks differ from known network-layer loops, bypassing existing packet lifetime checks at that level and representing a novel vector unaddressed by current mitigations.

This novel attack vector is yet to be exploited in the wild, however, Rossow warns that if left unaddressed it could readily be used by malefactors. 

Rossow and Pan reported their discoveries concerning December 2023 to the relevant vendors and a consortium of trusted operators. 

Moreover, CISPA researchers coordinated with The Shadowserver Foundation for an advisory publication and notification campaign on application-layer loop DoS threat.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...