Analytics // Threat Intelligence
7/10/2013
08:44 AM
Tim Wilson
Tim Wilson
Commentary
50%
50%

Commercial DDoS Services Proliferate, Are Responsible For Many Recent Attacks

Customers can DDoS a website for as little as $10, Vigilant by Deloitte speaker will tell Black Hat audience

Imagine a service where, for as little as $10, you can hire a provider to launch a distributed denial-of-service (DDoS) attack against any website you choose.

Click here for more of Dark Reading's Black Hat articles.

Now imagine that there are as many as 40 such services across the globe, serving customers as young as age 12.

It's no flight of imagination, according to Lance James, head of intelligence at Vigilant by Deloitte, a provider of security event management and threat intelligence services. It's the real deal, and these commercial "booter" services are growing rapidly.

James will join with security consultant Brian Krebs later this month at the Black Hat USA conference in Las Vegas to present the details of research into an emerging class of DDoS-on-demand services, and the findings are frightening.

In research that ties together data from its threat intelligence service -- which taps more than 40 different sources -- and other data collected by the researchers, James and Krebs will offer a snapshot of currently available DDoS services that have been used to launch many of the recent attacks that overwhelmed major websites, including some attacks by Anonymous, James said in an interview on Tuesday.

Some of the DDoS exploits discovered in the research include site-disabling attacks on the White House, Bank of America, MasterCard, Tumblr, and the NSA, James says.

Most of the DDoS services that the researchers studied are able to operate as legitimate entities by offering "stressor" services that enable users and companies to test their DDoS defenses by throwing a lot of traffic at their own websites, James explains. This "cover" usually includes legitimately operated Web servers that serve as command-and-control for the services.

However, some of these service operators are also capable of harnessing larger botnets of zombie computers and proxy servers that enable them to generate even larger amounts of traffic that can be turned like a firehose onto a targeted website, James says.

The services can be purchased at an hourly rate that starts as low as $10 and ranges into the hundreds, James says. One service the researchers studied generated more than $35,000 a month.

Typically, the customers of DDoS services are those in the age range of 12 to 20, James says. "Most of them are just teenagers who want to be able to say that they took down a major website and get into the news, or to take down each other's sites," he says. "It's sort of like writing graffiti on a wall. They can't hack the site themselves, so they pay a service to DDoS it for them."

Of course, there are more serious customers of the DDoS services, including hacktivist groups and organized criminals looking for a distraction to cover a more malicious attack, James says. But for the most part, the buyers of DDoS services are "kiddies hacking each other," he states.

The researchers also have found a number of "tells" that may help enterprises defend themselves against DDoS services. For example, many of the services use the same software code, thanks to a leak that has made it available to all of them. And many DDoS services have been operating on the same Internet service provider, which James declined to name.

Vigilant by Deloitte has been tracking and identifying DDoS services primarily through signatures created by the tools the services use, rather than by attack signatures, James says. By using these signatures, enterprises can defend themselves against some DDoS attacks and block some services.

"There aren't any ways to stop everything, but this talk will give people some ideas on things they can do," James says. "We think it'll help." Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.