LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
This blog was written by an independent guest blogger.
Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks take place every minute. DoS attacks require fewer resources, and so pose an even greater threat.
In this post, we’ll discuss what a DoS attack is and how it differs from a Distributed Denial of Service (DDoS) attack. We’ll then look at one of the latest techniques bad actors use to maximize the impact of their actions.
A DoS attack is pretty much what it sounds like. The bad actors render a device or computer unavailable to authorized users. This is accomplished by interrupting the normal functioning of the item.
DoS attacks will flood the target device with requests so that the device becomes overwhelmed. The device’s resources are all used to service these invalid requests. As a result, when a valid request comes along, there are no resources left.
There could be several reasons to launch a DoS attack. Some reasons include:
Both use the technique of overwhelming the target device. The primary difference is in the number of computers used during the attack. With a DoS attack, just one computer is needed. With a Distributed Denial of Service attack, several machines or bots are used instead.
You might feel that the DDoS attack is more effective. It’s indeed easier to overwhelm a device or server with requests from more bots rather than fewer. It’s also true that the attack is more likely to be detected and blocked.
One computer attacking the system might not have the same brute force, but you don’t always need brute force.
Say, for example, that a cashier clones your debit card while you’re paying for your items. She notices that you get a message from your bank whenever you swipe your card. She’d like to shop for as long as possible without you noticing, so she gets a friend to launch a DoS attack on your phone.
Her friend might use a buffer overflow attack technique on your phone. This attack uses up all the memory and processing power of your phone. You won’t receive messages or phone calls as a result.
This is a simplified example, but it just goes to show that you don’t always need an army for these kinds of attacks.
According to Wired, we’re liable to see more DoS attacks with the Web Services Dynamic Discovery Exploit. This admittedly is a clever exploit and one that becomes more relevant with the Internet of Things expanding.
With this attack form, the hacker ignores the primary system. Instead, they target vulnerable devices connected to the same network. These could be devices like printers, CCTV cameras, thermostats, etc.
The point is that those devices usually don’t have the same level of protection that a company’s servers have. The hacker spoofs the target IP address and pings the device. The device responds to the legitimate target server and ties up resources.
This attack is more difficult to detect than a direct attack because the requests are coming from devices authorized to use the network.
DoS attacks fall into one of two basic categories:
Communication between a server and the devices connected to it is essentially the exchange of packets of data. With flood attacks, the attacker sends in an overwhelming number of these packets. This type of attack requires a fair amount of bandwidth but can be relatively easily accomplished.
This will often result in a system crash.
This is the type of attack that we spoke about earlier. Here the attacker makes the memory buffer use all the processing power and hard disk space of the target device. The system slows to a crawl and is likely to crash.
It can be difficult to tell at times. A DoS attack may resemble connectivity errors. Good indicators include:
The advantage of being attacked by a single computer rather than an army of bots is that it’s easier to shut down one computer. If you suspect that you’re a victim of such an attack, you can block the relevant IP address on your firewall or through your ISP.
Defending against further attacks of this nature is possible through the use of specialized security tools. These tools identify patterns in behavior. If they notice that a particular IP address is sending an excessive number of requests, they can block it and halt the attack.
As cyber attacks go, a DoS attack may seem pretty vanilla. That is unless you’re on the receiving end of the attack. Now that you understand more about how these attacks work, though, you’re in a better position to defend against them.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.