Categories: Cyber CrimeHacking

Understanding Hit and Run DDoS attacks

Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited duration, and are arranged periodically, and

Incapsula firm has recently published a blog post to explain the efficiency of hit and run DDoS attacks, as remarked by the experts attackers don’t need to arrange large scale “server busters” to cause serious problems. Hit and run attacks are of the most profitable services in the cyber criminal ecosystem, typically attackers coming and going over a prolonged period of time with the intent to cause problems to the target, typically through the interruption of the service.

The Hit and Run attacks last for days or weeks, they are usually enough to saturate target’s resources. Hit and Run DDoS attacks are very insidious, it is usually not easy to identify their attack patterns, these kind of offensives are composed by a series of short bursts of high volume attacks, having a prefixed duration (e.g. 20-60 minutes), and are arranged periodically to interfere with target operation.

Hit and Run DDoS attacks are in nature “on demand attack“, the attackers limit the duration of the offensives to avoid the intervention of defense mechanisms, the typical DDoS defense solution works well for long DDoS attack, but their response time is too long to face with short DDoS.

“These attacks do not just target server resources. With Hit and Run, the attackers are working to exhaust the people who maintain these servers, their organizational popularity, and even their health and sanity.” reports the blog post form Incapsula.

 

DDoS services are very cheap to rent as explained in the last excellent report “Russian underground Revisited” issued by TrendMicro, following an example of their price.

As explained in the post, always-on solutions are not usable to mitigate this threat, despite they are effective to stop the Hit and Run DDoS attacks, they could have a serious impact on user experience, in the simplest scenario to clean the malicious traffic are used intermediary nodes to clean malicious traffic, and this creates an inevitable latency.

“For one, just by adding another hop between the website and its visitors, you create latency. Typically this is offset by caching, and optimized distribution over widespread PoPs. However, most DDoS protection services are built for protection, not content delivery, and don’t offer such features. Moreover, by keeping DDoS protection in “active mode,” visitors are generally subject to constant scrubbing, which causes service disruptions as result of both scrubbing challenges and false positives.”

Hit and Run DDoS attack could be mitigated with a rapid detection system that is able to activate in a short time the DDoS mitigation solution, but early identification is the principal problem for defense mechanisms.

Another element of great concern for Hit and Run attacks is the capability of attackers to craft high consumption requests, as explained a request rate of 30-50 call per second aimed at a specific CPU or I/O intensive resource can cause the paralysis of the target.

The defense against DDoS attacks must be carefully organized, all the factors explained must be carefully evaluated, classifying and identifying anomalies in traffic patterns.

Pierluigi Paganini

(Security Affairs –  Hit and Run, Cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

11 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

13 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

13 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

15 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

18 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.