Thursday, January 30, 2025
HomeDDOSMemcache Based DDOS Attack Heavily Targeted NRA and Highly Ranked Top Order...

Memcache Based DDOS Attack Heavily Targeted NRA and Highly Ranked Top Order Websites

Published on

SIEM as a Service

Follow Us on Google News

The Memcached-Based DDOS attack heavily targeted NRA Websites and also targeting top order website such as QQ.com and 360.com.

 The National Rifle Association is America’s longest-standing civil rights organization. The National Rifle Association of America (NRA) is an American nonProfit Organization that advocates for gun rights.

Apart from NRA, attack targets top order companies such as Google, Amazon, PornHub, PSN via vulnerable Memcached servers.

Memcached-Based DDOS attack Activities

Since 2018 february, the frequency of Memcache Based DDOS Attack have increased dramatically. As shown in the following two figures:

Netlab has been roughly divided this period of time into the following stages.

  • Prior to 2018-02-24, the daily average was less than 50 attacks.
  • The first stage: 02-24 ~ 02-28, an average of 372 attacks per day
  • Stage 2: 03-01 ~ 03-05, average daily 1938 attacks.
  • 03-08, 721 attacks already took place today, with 12 more hours to go

The above figure is the number of daily active reflectors. That is, these memcache servers actually participated in real attacks and later the Memcache Based DDOS Attack vector was stabled.

Researchers conducted real test on the 15k active reflectors on Mar 07. Roughly 15% of them respond to the “stats” command we request and thus indeed have the ability to engage in actual attacks.

Github Memcache Based DDOS Attack 

GitHub DDoS attack recorded the largest yet DDoS attack that peaked at 1.35Tbps via 126.9 million packets per second. The Volumetric DDOS attack takes place between 17:21 and 17:30 UTC on February 28th.

According to netlab, they observed two Memcache Based DDOS Attack against github, . The former is the one publicly documented.

  • Victim IP: 192.30.252.113
  • Fired at: 2018-03-01 14:26:22 GMT +8 and 2018-03-02 01:13:44 GMT +8 respectively.
  • Source Port: UDP 11211 source port
  • Attack Type: udp@attack@amp_flood_target-MEMCACHE

All these technical features are consistent with github’s public documents.

The recent victims are mainly concentrated in the United States, China (including Hong Kong, China), South Korea, Brazil, France, Germany, the United Kingdom, Canada, and the Netherlands.

There are some target IPs and their rank listed below :

Target IP                       Rank              Belongs to SLD
59.37.x.x                         09                    qq.com
36.110.x.x                       21                    360.cn
192.30.x.x                       74                    github.com
151.101.x.x                     80                    pinterest.com

IN this case with in 7 days, 10k attack events and  7131 unique victim IP addresses has been logged.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Apache CXF Vulnerability Triggers DoS Attack

Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a...

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and...