These Microsoft servers are helping fuel massive DDoS attacks


More than 12,000 poorly configured Microsoft servers have been discovered being abused to conduct impressively potent distributed denial of service (DDoS (opens in new tab)) attacks.
Cybersecurity researchers from Black Lotus Labs uncovered a total of 12,142 servers sporting Microsoft domain controllers hosting the company’s Active Directory services that were being used by multiple malware variants to magnify the size of DDoS attacks.
The servers belong to all sorts of organizations, from religious ones in North America, to commercial entities in North Africa.
Abused for months
Some of the most powerful ones exceeded 10Gbps in junk traffic, and reached as high as 17Gbps, the researchers said. Speaking to Ars Technica in an email, Black Lotus Lab researcher Chad Davis said the traffic was strong enough to DoS some less well-provisioned servers “all by itself”. “In theory, a hundred of these, working in unison, could generate a Terabit per second of attack traffic,” he said.
Some of these servers were abused for months, researchers further found. One, discovered in North America, was sending out gigs of junk traffic for 18 months, peaking at 2Gbps.
How were they able to produce such high output? By serving as amplifiers, or reflectors. Instead of using the compromised server endpoints (opens in new tab) to send junk traffic to the targets directly, and thus risk being spotted, attackers would send network requests to third parties, first. If those third parties were misconfigured in their networks, in the way these servers were, the requests could be spoofed as if they were coming from those third parties themselves. Not only that, but the servers could reflect the data at the target in sizes thousands of times bigger than the original payload.
According to Ars Technica, some of the more popular reflectors are misconfigured servers running open DNS resolvers, the network time protocol, Memcached for database caching, and the WS-Discovery protocol usually found in IoT devices.
More recently, threat actors started using the Connectionless Lightweight Directory Access Protocol (CLDAP) as a source of reflection attacks. As Microsoft’s variant of the Lightweight Directory Access Protocol, CLDAP uses User Datagram Protocol packets so Windows clients can discover services for authenticating users, the publication explained. Apparently, threat actors have been using this protocol for five years now, magnifying data torrents by up to 70 times.
The full report can be found on this link (opens in new tab).
Via: Ars Technica (opens in new tab)
Audio player loading… More than 12,000 poorly configured Microsoft servers have been discovered being abused to conduct impressively potent distributed denial of service (DDoS (opens in new tab)) attacks. Cybersecurity researchers from Black Lotus Labs uncovered a total of 12,142 servers sporting Microsoft domain controllers hosting the company’s Active Directory…
Recent Posts
- EA is releasing the source code for Command & Conquer and adding Steam Workshop support to further ’empower’ the community to create content for the classic games
- Microsoft pushes ahead with AI in gaming
- DirecTV launches Genre Packs, a more affordable way to get channels you actually want
- The newly announced PSVR 2 price cut might finally make it a viable Meta Quest 3 competitor
- Hoto’s 48-in-1 electric screwdriver set hits a record low $70
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010