Friday, April 25, 2025
HomeDDOSBlack Nurse attack: Will a single laptop bring down Servers/Routers

Black Nurse attack: Will a single laptop bring down Servers/Routers

Published on

SIEM as a Service

Follow Us on Google News

Black Nurse attack is a new-threat emerging on it’s horizon, it can be launched from a single laptop which is capable of bringing server/firewalls to their knees.

ICMP is an very commonly used protocol to identify live hosts, It is used by network devices like switches, Routers for sending error messages and operational information’s, for instance service is not available OR the host/server is reachable.You find the most detailed and types of ICMP code’s here.

Black Nurse attack mechanism

Most ICMP attacks based on Type 8 Code 0 also called ping flood attack. Blacknurse is based on ICMP with Type 3 Code 3 packets.We know that when a user has allowed ICMP Type 3 Code 3 to outside interfaces, the BlackNurse attack becomes highly effective even at low bandwidth.

- Advertisement - Google News
black1

This attack will be more effective even with the Low bandwidth(15-18Mbit/s). When the attack in progress the users from the LAN network will not able to send/receive over the Internet. All the firewalls/router will recover will recover once the attack stops.

Different firewalls would have different implementation for handling this type of attack,this even applied to customers with large internet uplinks and large enterprise firewalls in place.

Evaluating the Risk

You can implement the test with WAN area of the firewall and at the time of attack try to surf some pages in and out of Internet.The tests also showed that a single attacking machine running hping3 could, on its own, produce enough ICMP type 3 code 3 packets to consume pretty much all the firewall’s resources.

hping3 –icmp -C 3 -K 3 -i u200 [target]

hping3 –icmp -C 3 -K 3 –flood [target]

Here -i u200 orders hping3 to send packets every 200microseconds and few minutes later they upped the packet rate, by using the “–flood” argument.

Detection/Affected products

  • Cisco ASA 5506, 5515, 5525 (default settings)
  • Cisco ASA 5550 (legacy) and 5515-X (latest generation)
  • Cisco Router 897 (can be mitigated)
  • SonicWall (misconfiguration can be changed and mitigated)
  • Some unverified Palo Alto
  • Zyxel NWA3560-N (wireless attack from LAN side)
  • Zyxel Zywall USG50

Impact

Based on the research, this vulnerability or misconfiguration of some firewalls is easy to misuse.Impact can be high for those that allow ICMP to the firewall’s outside interface. Having high bandwidth is no guarantee  that this DOS/DDOS attack will not work.Impact can be different from network to network depends on what the network is covering. It’s recommend to test your network.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

159 CVEs Exploited in the Wild in Q1 2025, 8.3% Targeted Within 1-Day Vulnerabilities Exploited

VulnCheck's latest report for Q1 2025 has identified 159 Common Vulnerabilities and Exposures (CVEs)...

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...

FBI Offers $10 Million Reward for information on Salt Typhoon Hackers

The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State,...

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named "RustoBot" has been discovered exploiting vulnerabilities in various router models...

XorDDoS Malware Upgrade Enables Creation of Advanced DDoS Botnets

Cisco Talos has uncovered significant advancements in the XorDDoS malware ecosystem, revealing a multi-layered...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...