Menu
Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains

Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains

Despite visible progress 2,000 servers with large amplification factors remain, a security vendor reports

The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.

DDoS (distributed denial of service) amplification is an attack technique that involves tricking insecure servers into flooding a target with unrequested data. The method works with several protocols, including DNS (Domain Name System), SNMP (Simple Network Management Protocol) and NTP, that are vulnerable to IP address spoofing by design.

Attackers can send small requests with a forged source IP address to unprotected servers over these protocols to trigger the return of significantly larger responses to the spoofed address, which typically belongs to the intended victim.

In the case of NTP, attackers can use a command called monlist to force servers to respond with the IP addresses of up to the last 600 machines that queried them -- a large response compared to the original query -- allowing them to amplify the traffic they can generate.

In February, content delivery network CloudFlare reported that its infrastructure was the target of a DDoS attack that peaked at almost 400Gbps and which was the result of NTP-based amplification.

In December, NSFOCUS Information Technology, a network security company based in Beijing, ran an Internet-wide scan and found 432,120 vulnerable NTP servers worldwide. Of those servers, 1,224 were capable of amplifying traffic by a factor greater than 700.

The company repeated its scans in March and May with dramatically different results. In March, NSFOCUS found only 21,156 NTP servers that were still vulnerable to DDoS amplification abuse and their number further decreased to 17,647 in May.

The sharp decline indicates that many network and system administrators have taken steps to restrict access to the monlist feature on their NTP servers, the company said in a report Monday.

The U.S. Computer Emergency Response Team (US-CERT) posted an advisory in January with instructions on how to secure NTP servers by upgrading them to a version newer than 4.2.7 or by disabling monlist manually.

The decline in the number of vulnerable NTP servers observed by NSFOCUS was correlated by researchers from the SANS Internet Storm Center (ISC) using their own data.

"I'd like to suggest that while pundits are citing slow progress for patching Heartbleed, that in actuality, the Heartbleed issue is responsible for the sudden change," said Kevin Shortt, an incident handler at ISC, Monday in a blog post. "The month of May showed an extensive effort for patching and truing up patch levels because of Heartbleed. This effort likely assisted in the NTP issue being patched along with it."

However, the danger that insecure NTP servers pose to the Internet is not completely gone. According to NSFOCUS's data the number of vulnerable servers with an amplification factor of over 700 has actually increased since December, to 2,100.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags SANS Technology InstitutefirewallsNSFOCUS Information Technologyonline safetysecurityExploits / vulnerabilities

Featured

Slideshows

Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Top 15 Kiwi tech storylines to follow in 2017

Top 15 Kiwi tech storylines to follow in 2017

​The New Year brings the usual new round of humdrum technology predictions, glaringly general, unashamedly safe and perpetually predictable. But while the industry no longer sees value in “cloud is now the norm” type projections, value can be found in following developments of the year previous, analysing behaviours and patterns to formulate a plan for the 12 months ahead. Consequently, here’s the top Kiwi tech storylines to follow in 2017...

Top 15 Kiwi tech storylines to follow in 2017
Show Comments