Common Information
Type Value
Value
Reflection Amplification - T1498.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a reflector. An adversary accomplishes a reflection attack by sending packets to reflectors with the spoofed address of the victim. Similar to Direct Network Floods, more than one system may be used to conduct the attack, or a botnet may be used. Likewise, one or more reflectors may be used to focus traffic on the target.(Citation: Cloudflare ReflectionDoS May 2017) This Network DoS attack may also reduce the availability and functionality of the targeted system(s) and network. Reflection attacks often take advantage of protocols with larger responses than requests in order to amplify their traffic, commonly known as a Reflection Amplification attack. Adversaries may be able to generate an increase in volume of attack traffic that is several orders of magnitude greater than the requests sent to the amplifiers. The extent of this increase will depending upon many variables, such as the protocol in question, the technique used, and the amplifying servers that actually produce the amplification in attack volume. Two prominent protocols that have enabled Reflection Amplification Floods are DNS(Citation: Cloudflare DNSamplficationDoS) and NTP(Citation: Cloudflare NTPamplifciationDoS), though the use of several others in the wild have been documented.(Citation: Arbor AnnualDoSreport Jan 2018) In particular, the memcache protocol showed itself to be a powerful protocol, with amplification sizes up to 51,200 times the requesting packet.(Citation: Cloudflare Memcrashed Feb 2018)
Details Published Attributes CTI Title
Details Website 2024-11-07 5 Behind the 2024 US Election Curtain: Cyberwar's Silent Sabotage - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Details Website 2024-10-15 0 A Deep Dive into DDoS Carpet-Bombing Attacks - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Details Website 2024-10-15 2 A Deep Dive into DDoS Carpet-Bombing Attacks
Details Website 2024-09-03 6 Elite Botnet Hits Government Sites With “DDoS”
Details Website 2023-05-30 1 New vulnerability could lead to one of world’s most powerful cyber attacks | Bitsight
Details Website 2023-05-29 7 Anonymous Sudan Claims Successful Takedown of First Abu Dhabi Bank Website & Application Via DDoS Attacks | Threat Intelligence | CloudSEK
Details Website 2023-04-25 1 New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks
Details Website 2023-04-25 1 New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks - RedPacket Security
Details Website 2023-02-27 0 Global DDoS Attack Observation: the Latest Changes and Future Trends
Details Website 2021-10-11 0 NWDAF with Smart Analytics Based on Smart Data | NETSCOUT
Details Website 2021-08-23 0 All You Need to Know about DDoS Attack Prevention
Details Website 2021-01-19 37 FreakOut – Leveraging Newest Vulnerabilities for creating a Botnet - Check Point Research
Details Website 2019-11-18 0 Was Memcached a Turning Point? | NETSCOUT
Details Website 2018-03-08 40 Memcache UDP Reflection Amplification Attack II: The Targets, the Sources and Breakdowns
Details Website 2018-02-27 0 42% of Organizations Experienced Burst Attacks; The Rest Were Unaware They Were Attacked | Radware Blog