Common Information
Type Value
Value
Endpoint Denial of Service - T1499
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applications. Adversaries have been observed conducting DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014) An Endpoint DoS denies the availability of a service without saturating the network used to provide access to the service. Adversaries can target various layers of the application stack that is hosted on the system used to provide the service. These layers include the Operating Systems (OS), server applications such as web servers, DNS servers, databases, and the (typically web-based) applications that sit on top of them. Attacking each layer requires different techniques that take advantage of bottlenecks that are unique to the respective components. A DoS attack may be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS). To perform DoS attacks against endpoint resources, several aspects apply to multiple methods, including IP address spoofing and botnets. Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices. Botnets are commonly used to conduct DDoS attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for DDoS, so many systems are used to generate requests that each one only needs to send out a small amount of traffic to produce enough volume to exhaust the target's resources. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016) In cases where traffic manipulation is used, there may be points in the global network (such as high traffic gateway routers) where packets can be altered and cause legitimate clients to execute code that directs network packets toward a target in high volume. This type of capability was previously used for the purposes of web censorship where client HTTP traffic was modified to include a reference to JavaScript that generated the DDoS code to overwhelm target web servers.(Citation: ArsTechnica Great Firewall of China) For attacks attempting to saturate the providing network, see [Network Denial of Service](https://attack.mitre.org/techniques/T1498).
Details Published Attributes CTI Title
Details Website 2024-10-15 62 Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions
Details Website 2024-09-30 8 Dark Web Profile: UserSec - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-09-30 8 Dark Web Profile: UserSec
Details Website 2024-09-16 28 Threat Intelligence Report September 10 - September 16 2024 | Red Piranha
Details Website 2023-09-04 41 New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services
Details Website 2023-05-26 27 Threat Intelligence Report: Understanding and Mitigating ‘Cosmic Energy’ using the MITRE ATT&CK…
Details Website 2023-03-22 9 APT Profile: Sandworm - SOCRadar® Cyber Intelligence Inc.
Details Website 2023-03-06 9 Dark Web Profile: NoName057(16) - SOCRadar
Details Website 2023-03-02 199 Russia/Ukraine Update - February 2023
Details Website 2023-02-28 16 Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK – Sysdig
Details Website 2022-12-20 133 Russia/Ukraine Update - December 2022
Details Website 2022-11-29 132 Russia/Ukraine Update - November 2022
Details Website 2022-06-29 18 Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Details Website 2022-06-07 43 Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution
Details Website 2022-05-21 31 Analysis on recent wiper attacks: examples and how wiper malware works
Details Website 2022-03-01 65 IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine | WeLiveSecurity
Details Website 2019-07-08 188 Malicious campaign targets South Korean users with backdoor‑laced torrents | WeLiveSecurity