SlideShare a Scribd company logo
1 of 30
Q3 2013 Attack Report

www.prolexic.com
Types of DDoS attacks and their relative
distribution in Q3 2013
Infrastructure Layer: 76.52%
ACK: 1.69%
CHARGEN: 3.37%

RESET: 1.94%

ICMP: 11.41%

SYN: 18.16%

RIP: 0.13%

FIN PUSH: 0.39%

TCP Fragment: 0.65%
UDP Floods: 14.66%

RP: 0.39%

DNS: 8.94%

Application Layer: 23.48%

HTTP GET: 18.03%

2

HEAD: 0.13%

SYN PUSH: 0.13%

SSL POST: 0.26%
SSL GET: 0.78%
PUSH: 0.91%
HTTP POST: 3.37%

CONFIDENTIAL

UDP Fragment: 14.66%
Attack vectors Q3 2013, Q2 2013 and Q3 2012
SSL POST
SSL GET
PUSH

0.26%
0.26%
0.20%
0.78%
0.53%
0.61%
0.91%
0.39%
1.02%

Q3 2013
Q2 2013

3.37%
2.50%
3.07%

HTTP POST
NTP

Q3 2012

0.20%
0.13%
0.13%

HEAD

18.03%

HTTP GET
IGMP

0.20%

UDP Fragment

14.66%

8.70%
9.00%

UDP

10.41%

14.66%
19.63%

0.65%
0.26%
0.20%

TCP Fragment

18.16%

SYN

31.22%

23.53%
0.13%

SYN PUSH

0.41%
0.39%

RP

0.13%
1.02%
1.94%
1.19%
2.86%

RIP
RESET

11.41%

ICMP
DNS

4.92%

7.25%

15.15%

17.79%

8.94%

0.39%

FIN PUSH

0.41%
3.37%

CHARGEN
1.69%
0.53%
1.43%

ACK

3

21.48%

13.50%

0%

5%

10%

15%

CONFIDENTIAL
20%

25%

30%

35%
Changes in DDoS attacks per week
Q3 2013 vs. Q3 2012
250%

190%

200%

150%

Percentage

118%

109%
96%

100%

84%

50%

82%

80%

46%

43%

34%

43%

23-Sep

30-Sep

17%
0%
-7%

-16%

-50%
1-Jul

8-Jul

15-Jul

22-Jul

29-Jul

5-Aug

12-Aug 19-Aug 26-Aug
Time Day of Week

4

CONFIDENTIAL

2-Sep

9-Sep

16-Sep
Top ten source countries for DDoS attacks in
Q3 2013
Taiwan
2.95%

Poland
2.23%

Japan
2.11%

Italy
1.94%

India
3.45%
Russian Federation
4.45%
Brazil
4.46%

Republic of Korea
7.09%

United States
9.06%

5

China
62.26%

CONFIDENTIAL
Top ten source countries for DDoS attacks in
Q3 2013, Q2 2013 and Q3 2012
Q3
2013

Italy
Japan
Poland
Taiwan
India
Russia
Brazil
Korea
USA
China

1.94%
2.11%
2.23%
2.95%
3.45%
4.45%
4.46%
7.09%
9.06%
62.26%
0%

Q2
2013

Taiwan
UK
Iran
Italy
USA
France
Korea
Russia
Mexico
China

6

20%

30%

40%

50%

60%

70%

50%

60%

70%

50%

60%

70%

27.32%
39.08%
0%

Q3
2012

10%
1.81%
1.88%
2.14%
2.28%
4.12%
6.50%
7.29%
7.58%

Egypt
Vietnam
UK
Thailand
Saudi Arabia
Russia
Brazil
India
USA
China

10%

20%

30%

40%

2.77%
3.68%
3.69%
3.89%
4.55%
5.07%
5.23%
7.81%
27.85%
35.46%
0%

10%

20%

30%

CONFIDENTIAL
40%
Attack campaign start time –
Q3 2013, Q2 2013, Q3 2012
Percentage

12
10
8

Q3
2013

6
4
2
0
0

1

2

3

4

5

6

7

8

9

10 11 12 13 14 15 16 17 18 19 20 21 22 23

0

1

2

3

4

5

6

7

8

9

10 11 12 13 14 15 16 17 18 19 20 21 22 23

0

1

2

3

4

5

6

7

8

9

10 11 12 13 14 15 16 17 18 19 20 21 22 23

12
10
8

Q2
2013

6
4
2
0
12
10
8

Q3
2012

6
4
2

7

0

CONFIDENTIAL

Time
Border traffic and mitigation bits for a
September 6 attack

8

CONFIDENTIAL
Example of a DrDoS reflection attack

Primary Target

Malicious Actor

PACKET1
Spoofed Source (Target)
Destination (Victim)

Victim

9

Victim

Victim

CONFIDENTIAL

PACKET2 Reflected
Packet
Source (Victim)
Destination (Target)
cdos.c tool generating a CHARGEN packet with
a size of 29 bytes

10

CONFIDENTIAL
A Microsoft Windows 2000 server victim

11

CONFIDENTIAL
Packet data of the amplified DrDoS traffic

12

CONFIDENTIAL
Source regions of CHARGEN attacks against
gambling industry customer

13

CONFIDENTIAL
Top 10 ASNs participating in the attack against
the gambling industry customer
KRNIC-ASBLOCK-AP KRNIC
CHINANET-SH-AP China Telecom (Group)

6.90%

CHINANET-SCIDC-AS-AP CHINANET
SiChuan Telecom Internet Data Center
ATT-INTERNET4 - AT&T Services, Inc.

11.40%
59.40%

UUNET - MCI Communications
Services, Inc. d/b/a Verizon Business
CHINA169-BJ CNCGROUP IP network
China169 Beijing Province Network
LGDACOM LG DACOM Corporation

12.20%

CHINA169-BACKBONE CNCGROUP
China169 Backbone
HANARO-AS Hanaro Telecom Inc.
CHINANET-BACKBONE No.31,Jin-rong
Street

14

CONFIDENTIAL
Bandwidth graphs during this CHARGEN attack

15

CONFIDENTIAL
Pricing options for a stressor service

16

CONFIDENTIAL
Top 10 ASNs participating in the attack against
the entertainment industry customer
CNNIC-ALIBABA-CN-NET-AP Hangzou
Alibaba Advertising Co.,Ltd.

4.20%

OCN NTT Communications
Corporation
5.50%

38.60%

5.70%

7.70%

CABLE-NET-1 - Cablevision Systems
Corp.
CHINA169-BJ CNCGROUP IP network
China169 Beijing Province Network
UUNET - MCI Communications
Services, Inc. d/b/a Verizon Business
HANARO-AS Hanaro Telecom Inc.
CHINA169-BACKBONE CNCGROUP
China169 Backbone

8.90%
10.90%

9.90%

CMCS - Comcast Cable
Communications, Inc.
LGDACOM LG DACOM Corporation
CHINANET-BACKBONE No.31,Jin-rong
Street

17

CONFIDENTIAL
Source regions of CHARGEN attacks against
entertainment industry customer

18

CONFIDENTIAL
Mitigation control for CHARGEN campaign
against the entertainment industry customer

19

CONFIDENTIAL
Screenshot of RAGE booter

20

CONFIDENTIAL
Rage Booter API service panel

21

CONFIDENTIAL
RAGE booter API service panel

22

CONFIDENTIAL
Stressor panel with CHARGEN features

23

CONFIDENTIAL
Screenshot of advert selling a reflection IP list

24

CONFIDENTIAL
A forum for selling DrDoS scanners

25

CONFIDENTIAL
The attack console interface of the cdos.c
DrDoS toolkit

26

CONFIDENTIAL
Forum chatter about leaked tool market
saturation

27

CONFIDENTIAL
Forum selling CHARGEN scanner tool

28

CONFIDENTIAL
99 percent of servers participating in a CHARGEN reflection attack
ran a Microsoft Windows server operating system

Linux
Unix

0

Windows
Other

99.3%

29

CONFIDENTIAL
CHARGEN has been turned off

30

CONFIDENTIAL

More Related Content

Similar to Q3 2013 Global DDoS Attack Report

Keynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety NetworksKeynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety Networksglobal
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!APNIC
 
Advantech vsat day_2012
Advantech vsat day_2012Advantech vsat day_2012
Advantech vsat day_2012SSPI Brasil
 
Tech Talk by Peng Li: Open Mobile Networks with NFV
Tech Talk by Peng Li: Open Mobile Networks with NFVTech Talk by Peng Li: Open Mobile Networks with NFV
Tech Talk by Peng Li: Open Mobile Networks with NFVnvirters
 
Cala workshop final chile
Cala workshop final   chileCala workshop final   chile
Cala workshop final chileRafael Junquera
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesPositiveTechnologies
 
動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式
動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式
動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式Ryousei Takano
 
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...Priyanka Aash
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Competition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chainCompetition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chainChristoph Stork
 
Lte 5 g latim america 2017 what ran and small cell developments will make 5...
Lte 5 g latim america 2017   what ran and small cell developments will make 5...Lte 5 g latim america 2017   what ran and small cell developments will make 5...
Lte 5 g latim america 2017 what ran and small cell developments will make 5...Alberto Boaventura
 

Similar to Q3 2013 Global DDoS Attack Report (20)

Keynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety NetworksKeynote at ISCRAM-China2008: Next generation of Safety Networks
Keynote at ISCRAM-China2008: Next generation of Safety Networks
 
Software Defined RAN
Software Defined RANSoftware Defined RAN
Software Defined RAN
 
1 owa010010 wcdma ran overview issue 1.15
1 owa010010 wcdma ran overview issue 1.151 owa010010 wcdma ran overview issue 1.15
1 owa010010 wcdma ran overview issue 1.15
 
Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!Routing Security in 2017 – We can do better!
Routing Security in 2017 – We can do better!
 
Advantech vsat day_2012
Advantech vsat day_2012Advantech vsat day_2012
Advantech vsat day_2012
 
Lte latam 2016 v2.5a
Lte latam 2016 v2.5aLte latam 2016 v2.5a
Lte latam 2016 v2.5a
 
SDN: TIME TO ACCELERATE THE PACE…
SDN: TIME TO ACCELERATE THE PACE…SDN: TIME TO ACCELERATE THE PACE…
SDN: TIME TO ACCELERATE THE PACE…
 
SCFT report
SCFT reportSCFT report
SCFT report
 
Introduction to GPRS
Introduction to GPRSIntroduction to GPRS
Introduction to GPRS
 
Hws&reigate south fitzoy
Hws&reigate south fitzoyHws&reigate south fitzoy
Hws&reigate south fitzoy
 
Tech Talk by Peng Li: Open Mobile Networks with NFV
Tech Talk by Peng Li: Open Mobile Networks with NFVTech Talk by Peng Li: Open Mobile Networks with NFV
Tech Talk by Peng Li: Open Mobile Networks with NFV
 
Cala workshop final chile
Cala workshop final   chileCala workshop final   chile
Cala workshop final chile
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
Dwdm cisco
Dwdm ciscoDwdm cisco
Dwdm cisco
 
動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式
動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式
動的ネットワーク切替を用いた省電力指向トラフィックオフロード方式
 
LTEcloudSecurityIssuesTakeaways-GP
LTEcloudSecurityIssuesTakeaways-GPLTEcloudSecurityIssuesTakeaways-GP
LTEcloudSecurityIssuesTakeaways-GP
 
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Competition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chainCompetition and regulation challenges in the Internet Value chain
Competition and regulation challenges in the Internet Value chain
 
Lte 5 g latim america 2017 what ran and small cell developments will make 5...
Lte 5 g latim america 2017   what ran and small cell developments will make 5...Lte 5 g latim america 2017   what ran and small cell developments will make 5...
Lte 5 g latim america 2017 what ran and small cell developments will make 5...
 

More from State of the Internet

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of the Internet
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterState of the Internet
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicState of the Internet
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsState of the Internet
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicState of the Internet
 

More from State of the Internet (6)

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by Quarter
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 Infographic
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack Statistics
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
DDoS Attack & Defense Infographic
DDoS Attack & Defense InfographicDDoS Attack & Defense Infographic
DDoS Attack & Defense Infographic
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Q3 2013 Global DDoS Attack Report

  • 1. Q3 2013 Attack Report www.prolexic.com
  • 2. Types of DDoS attacks and their relative distribution in Q3 2013 Infrastructure Layer: 76.52% ACK: 1.69% CHARGEN: 3.37% RESET: 1.94% ICMP: 11.41% SYN: 18.16% RIP: 0.13% FIN PUSH: 0.39% TCP Fragment: 0.65% UDP Floods: 14.66% RP: 0.39% DNS: 8.94% Application Layer: 23.48% HTTP GET: 18.03% 2 HEAD: 0.13% SYN PUSH: 0.13% SSL POST: 0.26% SSL GET: 0.78% PUSH: 0.91% HTTP POST: 3.37% CONFIDENTIAL UDP Fragment: 14.66%
  • 3. Attack vectors Q3 2013, Q2 2013 and Q3 2012 SSL POST SSL GET PUSH 0.26% 0.26% 0.20% 0.78% 0.53% 0.61% 0.91% 0.39% 1.02% Q3 2013 Q2 2013 3.37% 2.50% 3.07% HTTP POST NTP Q3 2012 0.20% 0.13% 0.13% HEAD 18.03% HTTP GET IGMP 0.20% UDP Fragment 14.66% 8.70% 9.00% UDP 10.41% 14.66% 19.63% 0.65% 0.26% 0.20% TCP Fragment 18.16% SYN 31.22% 23.53% 0.13% SYN PUSH 0.41% 0.39% RP 0.13% 1.02% 1.94% 1.19% 2.86% RIP RESET 11.41% ICMP DNS 4.92% 7.25% 15.15% 17.79% 8.94% 0.39% FIN PUSH 0.41% 3.37% CHARGEN 1.69% 0.53% 1.43% ACK 3 21.48% 13.50% 0% 5% 10% 15% CONFIDENTIAL 20% 25% 30% 35%
  • 4. Changes in DDoS attacks per week Q3 2013 vs. Q3 2012 250% 190% 200% 150% Percentage 118% 109% 96% 100% 84% 50% 82% 80% 46% 43% 34% 43% 23-Sep 30-Sep 17% 0% -7% -16% -50% 1-Jul 8-Jul 15-Jul 22-Jul 29-Jul 5-Aug 12-Aug 19-Aug 26-Aug Time Day of Week 4 CONFIDENTIAL 2-Sep 9-Sep 16-Sep
  • 5. Top ten source countries for DDoS attacks in Q3 2013 Taiwan 2.95% Poland 2.23% Japan 2.11% Italy 1.94% India 3.45% Russian Federation 4.45% Brazil 4.46% Republic of Korea 7.09% United States 9.06% 5 China 62.26% CONFIDENTIAL
  • 6. Top ten source countries for DDoS attacks in Q3 2013, Q2 2013 and Q3 2012 Q3 2013 Italy Japan Poland Taiwan India Russia Brazil Korea USA China 1.94% 2.11% 2.23% 2.95% 3.45% 4.45% 4.46% 7.09% 9.06% 62.26% 0% Q2 2013 Taiwan UK Iran Italy USA France Korea Russia Mexico China 6 20% 30% 40% 50% 60% 70% 50% 60% 70% 50% 60% 70% 27.32% 39.08% 0% Q3 2012 10% 1.81% 1.88% 2.14% 2.28% 4.12% 6.50% 7.29% 7.58% Egypt Vietnam UK Thailand Saudi Arabia Russia Brazil India USA China 10% 20% 30% 40% 2.77% 3.68% 3.69% 3.89% 4.55% 5.07% 5.23% 7.81% 27.85% 35.46% 0% 10% 20% 30% CONFIDENTIAL 40%
  • 7. Attack campaign start time – Q3 2013, Q2 2013, Q3 2012 Percentage 12 10 8 Q3 2013 6 4 2 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 12 10 8 Q2 2013 6 4 2 0 12 10 8 Q3 2012 6 4 2 7 0 CONFIDENTIAL Time
  • 8. Border traffic and mitigation bits for a September 6 attack 8 CONFIDENTIAL
  • 9. Example of a DrDoS reflection attack Primary Target Malicious Actor PACKET1 Spoofed Source (Target) Destination (Victim) Victim 9 Victim Victim CONFIDENTIAL PACKET2 Reflected Packet Source (Victim) Destination (Target)
  • 10. cdos.c tool generating a CHARGEN packet with a size of 29 bytes 10 CONFIDENTIAL
  • 11. A Microsoft Windows 2000 server victim 11 CONFIDENTIAL
  • 12. Packet data of the amplified DrDoS traffic 12 CONFIDENTIAL
  • 13. Source regions of CHARGEN attacks against gambling industry customer 13 CONFIDENTIAL
  • 14. Top 10 ASNs participating in the attack against the gambling industry customer KRNIC-ASBLOCK-AP KRNIC CHINANET-SH-AP China Telecom (Group) 6.90% CHINANET-SCIDC-AS-AP CHINANET SiChuan Telecom Internet Data Center ATT-INTERNET4 - AT&T Services, Inc. 11.40% 59.40% UUNET - MCI Communications Services, Inc. d/b/a Verizon Business CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network LGDACOM LG DACOM Corporation 12.20% CHINA169-BACKBONE CNCGROUP China169 Backbone HANARO-AS Hanaro Telecom Inc. CHINANET-BACKBONE No.31,Jin-rong Street 14 CONFIDENTIAL
  • 15. Bandwidth graphs during this CHARGEN attack 15 CONFIDENTIAL
  • 16. Pricing options for a stressor service 16 CONFIDENTIAL
  • 17. Top 10 ASNs participating in the attack against the entertainment industry customer CNNIC-ALIBABA-CN-NET-AP Hangzou Alibaba Advertising Co.,Ltd. 4.20% OCN NTT Communications Corporation 5.50% 38.60% 5.70% 7.70% CABLE-NET-1 - Cablevision Systems Corp. CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network UUNET - MCI Communications Services, Inc. d/b/a Verizon Business HANARO-AS Hanaro Telecom Inc. CHINA169-BACKBONE CNCGROUP China169 Backbone 8.90% 10.90% 9.90% CMCS - Comcast Cable Communications, Inc. LGDACOM LG DACOM Corporation CHINANET-BACKBONE No.31,Jin-rong Street 17 CONFIDENTIAL
  • 18. Source regions of CHARGEN attacks against entertainment industry customer 18 CONFIDENTIAL
  • 19. Mitigation control for CHARGEN campaign against the entertainment industry customer 19 CONFIDENTIAL
  • 20. Screenshot of RAGE booter 20 CONFIDENTIAL
  • 21. Rage Booter API service panel 21 CONFIDENTIAL
  • 22. RAGE booter API service panel 22 CONFIDENTIAL
  • 23. Stressor panel with CHARGEN features 23 CONFIDENTIAL
  • 24. Screenshot of advert selling a reflection IP list 24 CONFIDENTIAL
  • 25. A forum for selling DrDoS scanners 25 CONFIDENTIAL
  • 26. The attack console interface of the cdos.c DrDoS toolkit 26 CONFIDENTIAL
  • 27. Forum chatter about leaked tool market saturation 27 CONFIDENTIAL
  • 28. Forum selling CHARGEN scanner tool 28 CONFIDENTIAL
  • 29. 99 percent of servers participating in a CHARGEN reflection attack ran a Microsoft Windows server operating system Linux Unix 0 Windows Other 99.3% 29 CONFIDENTIAL
  • 30. CHARGEN has been turned off 30 CONFIDENTIAL