New Application-Layer Loop DoS Attack – 300,000 Online Systems At Risk

Denial-of-service (DoS) attacks are usually exploited by hackers to interrupt regular network and website functioning, with motives of making money or for political reasons or simply to create a mess. 

The websites or networks can be made unavailable through the Denial of Service (DoS) attack method which sends numerous requests for resources and traffic to the system.

Researchers at CISPA Helmholtz-Center for Information Security discovered a new Denial-of-Service attack vector called “Application-layer Loop DoS Attacks.” 

It targets UDP-based application protocols by pairing their servers to communicate indefinitely, affecting both legacy protocols like QOTD, Chargen, and Echo and contemporary ones like DNS, NTP, and TFTP. 

This vulnerability puts an estimated 300,000 Internet hosts and networks at risk of denial-of-service conditions.

Loop DoS Attack

Loop DoS Attack

The newly discovered self-perpetuating DoS loop attack targets application-layer messages by pairing two network services that keep responding indefinitely, creating large traffic volumes resulting in denial of service. 

Once triggered, even attackers cannot stop it. Previously, loop attacks occurred on routing layers with finite iterations. 

This attack by CISPA researchers concerns 300,000 Internet hosts, confirming vulnerabilities in TFTP, DNS, NTP, and six legacy protocols providing basic Internet functionalities like time synchronization, name-to-IP mapping, and unauthenticated file transfer.

Application-layer loop DoS attacks employ IP spoofing, enabling initiation from a single spoofing-capable host. 

For example, attackers could trigger a perpetual loop between two vulnerable TFTP servers by injecting one spoofed error message, causing them to exchange error messages and stress networks between them endlessly. 

These attacks differ from known network-layer loops, bypassing existing packet lifetime checks at that level and representing a novel vector unaddressed by current mitigations.

This novel attack vector is yet to be exploited in the wild, however, Rossow warns that if left unaddressed it could readily be used by malefactors. 

Rossow and Pan reported their discoveries concerning December 2023 to the relevant vendors and a consortium of trusted operators. 

Moreover, CISPA researchers coordinated with The Shadowserver Foundation for an advisory publication and notification campaign on application-layer loop DoS threat.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Tushar Subhra

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a significant…

14 seconds ago

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance decentralized…

21 minutes ago

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your digital…

26 minutes ago

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt sensitive…

2 hours ago

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege…

2 hours ago

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited,…

5 hours ago