Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

06:20 PM

DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records

China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.

More than 4.7 million sources in five countries — the US, China, South Korea, Russia, and India — were used to level distributed denial-of-service (DDoS) attacks against victims in the second quarter of 2020, with the portmap protocol most frequently used as an amplification vector to create massive data floods, security and services firm A10 Networks says in its threat report for the second quarter. 

In its "State of DDoS Weapons" report for the second quarter of 2020, the company finds that China, Vietnam, and Taiwan accounted for more than a third of all DDoS botnet clients, while the most common high-volume floods used amplification attacks via portmap, the Simple Network Management Protocol (SNMP), and the Simple Service Discovery Protocol (SSDP). 

For the most part, while the infrastructure has become somewhat more sophisticated, the attacks have remained the same, says Rich Groves, director of research and development at A10 Networks. 

"DDoS attacks have been evolving to use more vectors for the past few years, and this is no exception moving forward," he says. "In many cases, if the attack type works — as many reflection, amplification, syn floods have for years — they will not stop."

The peak volume of the largest attacks continues to grow. In the first quarter of 2020, Amazon Web Services noted a 23% increase in the number of "volumetric events," such as data floods, including a reflection attack with a peak volume of 2.3 terabits per second, more than 70% higher bandwidth than the previously largest attack. 

The attack recorded by AWS used an increasingly common — but still not top-five — amplification method that abuses the Connection-less Lightweight Directory Access Protocol (CLDAP) protocol. While less than 16,000 potential sources — or "weapons" in A10 Networks' parlance — of CLDAP reflection attacks were detected in the second quarter, the attacks do tend to hit above their weight class, A10 Networks stated in its report. 

"The AWS attack shows that even this fractional attack surface has the potential for generating very large scale DDoS attacks and the only way to protect against these attacks is to proactively keep track of DDoS weapons and potential exploits," the company states in the report.

Different countries had different collections of DDoS sources. China, Vietnam, and Taiwan had the most compromised systems used by attackers as DDoS clients — with the three countries accounting for a third of all botnet agents — while the United States, South Korea, and China had the most exposed servers that were used by attackers to stage amplification attacks. 

The most common vectors for DDoS amplification attacks included 1.8 million sources of portmap attacks, 1.7 million SNMP attacks, and 1.7 million SSDP attacks. 

For the most part, DDoS botnet clients — or "drones" — were established on compromised Internet of Things (IoT) devices, according to the report. The most common exploits used to establish such IoT botnets targets vulnerabilities in devices exposing a telnet connection, unpatched flaws in Netgear routers, and security issues in digital video recorders, the report stated.

With more people working from home, these vulnerable IoT issues will likely only become worse, says A10 Networks' Groves. "This behavior will not stop, unfortunately, and will just get worse as more IoT devices are adopted in the home, which seems to be happening during this lockdown period," he says.

While the total number of sources of distributed DDoS attacks in the second quarter seemingly declined by 54% year-over-year, A10 Networks changed its methodology in collecting data, focusing on unique sources of attacks in the most recent version of the data, which cuts the total number of sources by about half, a spokesperson says.

While the current quarter's "State of DDoS Weapons" report is not yet published, A10 Networks plans to publish a blog post on the results. 

Related Content:



Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
User Rank: Ninja
7/22/2020 | 10:30:58 AM
Despise DDoS
I despise DDoS. Though it can be effective it is such a low level of skill that anyone is capable of performing. Its basically the equivalent of that loudest person in the room. That being said, reflective DNS and amplication based DDoS display a semblance of tact but not to the point where it merits this much publicity. I say we let networking or our ISP's or our application scrubbers drop the packets on the floor and move on.
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-13
A Denial of Service due to Improper Input Validation vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially to prevent any new user connections.
PUBLISHED: 2021-05-13
A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the victim’s local machine with t...
PUBLISHED: 2021-05-13
An Information Disclosure vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially gain access to a victim's web history.
PUBLISHED: 2021-05-13
Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when commands such as "saslStart", "saslContinue", "i...
PUBLISHED: 2021-05-13
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.