Sign in
  • Home
  • About Us
  • Services
    • SaaS
    • Training
    • Consulting
  • Solutions
    • Email Archive Service
    • Messaging Security Service
    • Malware Protection Security Service
    • Large File Transfer Service
    • File Integrity Monitoring as a Service
  • Cyber News
  • Contacts
Sign in
Welcome!Log into your account
Forgot your password?
Password recovery
Recover your password
Search
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Dataproof Communications
  • Home
  • About Us
  • Services
    • SaaS
    • Training
    • Consulting
  • Solutions
    • Email Archive Service
    • Messaging Security Service
    • Malware Protection Security Service
    • Large File Transfer Service
    • File Integrity Monitoring as a Service
  • Cyber News
  • Contacts
Home Cyber News Imperva Blocks Our Largest DDoS L7/Brute Force Attack Ever (Peaking at 292,000...
  • Cyber News
  • Imperva

Imperva Blocks Our Largest DDoS L7/Brute Force Attack Ever (Peaking at 292,000 RPS)

By
Editor Dataproof
-
24/07/2019
0
1390
Share on Facebook
Tweet on Twitter

Imagine you’re a developer building a new web application. You’ve followed all of the security best practices, hired a reputable penetration testing company before launch, and gone through extensive bug fixing to remove any vulnerabilities. However, would you be confident that your application could survive the largest and longest DDoS attack that you’d ever seen?

Targeting the authentication component of your site, this DDoS attack was led by a botnet coordinating 402,000 different IPs, lasted 13 days and directed a peak flow of 292,000 RPS (Requests Per Second). Such a massive attack is more than possible — one of our CDN customers in the entertainment industry was hit by one earlier this spring. 

It was the largest Layer 7 DDoS attack Imperva has ever seen (see below, click to enlarge). However, our application security successfully mitigated the attack during its entire 13-day span. So despite the ferocity, our customer suffered no downtime. 

Layer 7 attack

Imperva has mitigated Layer 3/4 attacks that, using a different measure, peaked at 500 million packets per second. This, however, was the largest DDoS Layer 7 (application layer) attack to date we have observed, using the most relevant measure for Layer 7 attacks, Requests Per Second (You can read more about the types of DDoS here).

Attack Analysis

By analyzing the IPs that performed the attack, we found that the main source was Brazil.

The attackers used a legitimate User-Agent, the same as used by the entertainment industry customer service application, to mask their attack. In spite of this, our client classification mechanism could distinguish it from the customer’s legitimate application.

For a time, the attack targeted the authentication component of the streaming application. We are not sure if the intent of the attackers was to perform a brute force attack or DDoS attack, but without an accurate mitigation mechanism, the result was the same — denial of service.

Imperva recently released a new capability of our Application Security suite called Account Takeover Protection to protect against advanced account takeover attacks like brute force or credential stuffing. As this attack occurred in late spring before the launch of ATO, we were unable to analyze the brute force aspects of the attack.

So we began looking for a common denominator. We found that most of the IPs had the same opened ports: 2000 and 7547. These are associated with IoT devices infected by the Mirai malware according to the cybersecurity blog, Recorded Future.

Mirai Is Still Alive and Evolving

We analyzed Mirai back in 2016, and published a detailed investigation:“Breaking Down Mirai: An IoT DDoS Botnet Analysis”.

Following the release of Mirai’s source code some years ago, many new variants have emerged. Some of them just included additional IoT device default credentials to target more vendors’ devices, while others added new functionality.

Compromising the IoT device is the first part of the attack. Thereafter, the attacker uploads malicious software to the device that will receive commands from a Command and Control server (CnC). Mirai source code contains only DDoS functionality, but nothing prevents the attacker from including other malicious software to take advantage of compromised devices and perform additional attacks, such as brute force.

Summary

Since 2016, many new IoT vendors have entered the market. Few have learned from the security mistakes of the past. As a result, today IoT devices are used in most of the large botnets we have seen. 

Botnets of IoT devices will only get larger. We live in a connected world, so the number of IoT devices continues to grow fast and vendors still do not consider security a top priority.

It is almost impossible to protect your business and your applications from a DDoS attack at this scale without assistance. You need a 3rd party vendor that can handle both Application Layer 7 DDoS attacks and Network Layer 3/4 DDoS attacks.

If we look again at this attack from a brute force (or Account Takeover) perspective, mitigation may seem easy. Can’t you simply limit the rate of authentication attempts on your application? 

However, a botnet with 400,000 IPs can perform a “slow and low” attack: each IP tries a few logins,  goes inactive, and then tries a few more. In such a technique, the access rate is very low, mimicking legitimate login attempts, and staying under rate limit policies.  You can protect yourself, your business and your reputation by using the Account Takeover Protection capability of Imperva’s Application Security stack. Stay safe!

The post Imperva Blocks Our Largest DDoS L7/Brute Force Attack Ever (Peaking at 292,000 RPS) appeared first on Blog.

– Read more

  • TAGS
  • account takeover
  • Application Security
  • botnet
  • DDoS attack
  • DDoS mitigation
  • internet of things
  • IoT
  • layer 7 attack
  • mirai
  • requests per second
SHARE
Facebook
Twitter
  • tweet
Previous articleNew 3-Second DDoS Mitigation SLA is 3x Faster and the Industry’s Best
Next articleEnabling Faster DDoS Mitigation for Cloud Assets
Editor Dataproof

RELATED ARTICLESMORE FROM AUTHOR

Cyber News

Using Infoblox and Ansible to Automate VM provisioning on Vmware vCenter Server

Cyber News

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability

Cyber News

Ransomware: two pieces of good news

Cyber News

A Leader in the 2019 Gartner Magic Quadrant for WAF, Six Years Running

Cyber News

Hello! My name is Dtrack

Cyber News

Threat landscape for smart buildings

RSS Security Awareness Tips

  • An error has occurred, which probably means the feed is down. Try again later.

Latest article

Using Infoblox and Ansible to Automate VM provisioning on Vmware vCenter Server

Cyber News Editor Dataproof - 27/09/2019
0
Read more

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability

Cyber News Editor Dataproof - 26/09/2019
0
Imperva’s Cloud WAF has identified instances of a new 0-day vulnerability being exploited within a matter of hours of the exploit being published. On Monday...

Ransomware: two pieces of good news

Cyber News Editor Dataproof - 25/09/2019
0
“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...

A Leader in the 2019 Gartner Magic Quadrant for WAF, Six Years Running

Cyber News Editor Dataproof - 23/09/2019
0
Gartner has published its 2019 Gartner Magic Quadrant for Web Application Firewalls (WAF) and Imperva has been named a Leader for the sixth consecutive...

EDITOR PICKS

Using Infoblox and Ansible to Automate VM provisioning on Vmware vCenter...

27/09/2019

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution...

26/09/2019

Ransomware: two pieces of good news

25/09/2019

Find us

Dataproof Communications
Block 09 Pinewood Office Park
33 Riley Road
Woodmead 2128
South Africa
Phone: 011 032 7700
Fax: 011 032 7788

POPULAR POSTS

Threats to users of adult websites in 2018

21/02/2019

The World’s Most Popular Coding Language Happens to be Most Hackers’...

26/09/2018

IT threat evolution Q2 2019

19/08/2019

Operating Hours

Monday08:00 - 17:00
Tuesday08:00 - 17:00
Wednesday08:00 - 17:00
Thursday08:00 - 17:00
Friday08:00 - 17:00

POPULAR CATEGORY

  • Cyber News575
  • Tech News344
  • Kaspersky147
  • Imperva133
  • Centrify97
  • Tripwire96
  • Infoblox72
  • Digital Guardian14
  • Gemalto4

Equity and Structure

The company has a level 2 B-BEE rating with 63% black ownership, with a team of passionate professionals with over 30 years of experience in ICT industry. Our vision is to be a world class leader in cyber security incident management and response solutions.

ABOUT US
DataProof Communications is Cybersecurity Company incorporated in 2014 specialising in cybersecurity operations, incident management and response best practices and technologies. DataProof’s objective is to provide comprehensive cybersecurity solutions through people, processes and technology to help organisations protect the confidentiality, integrity and availability of their ICT assets.
Contact us: info@dataproof.co.za
  • Home
  • About Us
  • Services
    • SaaS
    • Training
    • Consulting
  • Solutions
    • Email Archive Service
    • Messaging Security Service
    • Malware Protection Security Service
    • Large File Transfer Service
    • File Integrity Monitoring as a Service
  • Cyber News
  • Contacts
© Dataproof Communication 2018
MORE STORIES

Using Infoblox and Ansible to Automate VM provisioning on Vmware vCenter...

27/09/2019

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution...

26/09/2019

Ransomware: two pieces of good news

25/09/2019
Edit with Live CSS
Save
Write CSS OR LESS and hit save. CTRL + SPACE for auto-complete.