Closed emanjon closed 1 year ago
I found a report from Radware and added some text refrencing that report
According to Radware {{DDoS-Report}}, CoAP was behind a significant part of DDoS attacks in Q4 2020 and Q1 2021, but not in Q2 and Q3 of 2021.
https://www.radware.com/2021q3-ddos-report/
It seems unclear why the DDoS attacks using CoAP stopped and if they migth start again.
FBI warns of new DDoS attack vectors: CoAP, WS-DD, ARMS, and Jenkins
CoAP
In December 2018, cyber actors started abusing the multicast and command transmission features of the Constrained Application Protocol (CoAP) to conduct DDoS reflection and amplification attacks, resulting in an amplification factor of 34, according to open source reporting. As of January 2019, the vast majority of Internet-accessible CoAP devices were located in China and used mobile peer-to-peer networks.
"Abuse the multicast" makes me simply wondering. According Is multicast on the public internet possible? And if yes: How? it seems to be hardly possible.
I would prefer to leave this issue open to collect more information over time.
Beginning in the middle of January 2019, we began to see DDoS attacks leveraging CoAP. The targets were geographically and logically well distributed, with little commonality between them. An average attack lasts just over 90 seconds with about 100 packets-per-second generated by the attacker.
Not sure, 90s with 100 packets/s ?
That's in my opinion either a typo or a hoax. A raspberry PI can process without any trouble up to 1000 msg/s. So hard to see the attack.
Comparing scans performed two weeks apart, only 20% of the addresses appear in both scans. Compared to SSDP which boasts a similar amplification factor, the transient nature of CoAP devices means attackers have to constantly scan for abusable addresses in order to be effective.
Using the current numbers of Shodan/coap about 350.000, or Shadowserver/coap about 340.000 and assuming, that there are about 3702258944 public ip-address the hit-ratio is about 1:10000. So either an assumption to narrow the search range is required, or you need 10000 request ahead to find a target for amplification.
So let me repeat again: In my opinion I would prefer, if there is more concrete data about that "amplification abuse". For me too many sources don't verify to well.
Misconfigured D/TLS servers that do not implement the HelloClientVerify anti-spoofing mechanism can be abused to launch UDP reflection/amplification attacks with an amplification ratio of 37.34:1. The amplified attack traffic consists of both initial UDP fragmented packets sourced from UDP/443 and non-initial fragmented UDP packets, directed towards the destination IP address(es) and UDP port(s) of the attacker’s choice.
Approximately 4,283 abusable D/TLS servers have been identified to date.
A common ClientHello is about 150-200 bytes. That would result in in a flight with 7K as answer from the server. I think, the most IoT use-case will not use such "monster-certificate-chains". And for sure, use a HelloVerifyRequest. But anyway interesting.
DDoS Attack Vectors Live or Die
To perform this research, we use a high-powered scanner as part of a research initiative to ferret out vulnerable devices, protocols, and applications. Scans conducted on December 31st, 2019 revealed the following:
~616k - Devices vulnerable to abuse for COAP Version 1 ~689k - Devices vulnerable to abuse for COAP Version 2 ~166k - Devices vulnerable to abuse for Ubiquiti Discovery Protocol
These numbers might seem negligible compared to the sheer number of IoT and other devices available on the internet. However, further analysis revealed that attackers utilize an even smaller percentage of the available devices for attacks:
The largest attack we observed for COAP Version 1 used ~2,800 (0.46%) of the available 616k+ devices The largest attack we observed for COAP Version 2 used ~2,900 (0.42%) of the available 689k+ devices The largest attack we observed in ATLAS was 148.93 Gbps for both COAP versions in the second half of 2019.* The largest attack we observed for Ubiquiti used 24.57% of available devices The largest attack we observed in ATLAS was 348.91 Gbps in the second half of 2019.*
Really interesting numbers. (I'm not sure, what coap version 1 and 2 means.) 148 Gbps / 5,700 = 25Mbps per device.
I guess, I try to write a e-mail at the weekend and see, If I can get some clarification/answers.
I found a web cast with more explanations about DDoS Attack Vectors Live or Die:
There "NETSCOUT Threat Intelligence Report 2H 2019".
The webcast declares for the COAP Version 1 an amplification of 34:1 and for version 2 of 6.5:1. That makes me belief, version 1 and 2 are not the versions of the protocol (with the 2 unknown), that are the versions (or better variants) of the that attack request.
(I also wrote a e-mail, but I think, that's 2 years too late ;-) ).
TP240PhoneHome Reflection/Amplification DDoS Attack Vector
The average packet size for that attack was approximately 60 bytes
exposed system test facility can be abused
One outcome of that attack may be, that using RFC7641 may also use SAV (Source Address Validation, e.g. echo-tag) in order to provide protection against such kinds of DoS attacks.
NetScout - DDoS Threat Landscape - Russia
The "Attack Duration Analysis" indicates, that about 70% of the attack takes not longer than 10 minutes.
The "DDoS Attack Vector Analysis" doesn't list CoAP at all.
Bad Actors Innovate, Extort, and Launch 9.7 Million DDoS Attacks
Direct-path attacks are gaining in popularity. Adversaries inundated organizations with TCP- and UDP-based floods, otherwise known as direct-path or nonspoofed attacks.
FMPOV, just preventing outgoing amplification is not enough. It's also important to get effective protection for incoming malicious traffic, as DTLS 1.2 based firewall
Using ML/AI for Better Network and DDoS Security Insights (April 6, 2022)
Traditional DDoS getting less important, misused botnets are increasing.
Good discussion. Anything that should be added to the document?
Anything that should be added to the document?
Sure, don't "paint it black".
Remove the most indirect and not proofed information or at least mark them accordingly.
Take the statement:
"CoAP amplification attacks made a comeback in 2020 and CoAP was behind a significant part of global DDoS attacks in Q4 2020 and Q1 2021, but not at all in Q2 and Q3 of 2021 {{DDoS-2021}}."
and above
I found a report from Radware and added some text refrencing that report
According to Radware {{DDoS-Report}}, CoAP was behind a significant part of DDoS attacks in Q4 2020 and Q1 2021, but not in Q2 and Q3 of 2021. https://www.radware.com/2021q3-ddos-report/
If I read that "1108_DDos_1108_rev_enUS.pdf" (), coap is only found on two pages, 11 and 12.
Page 11: "coap 0,154%" in figure 21, Top amplification volumes (normalized) in Q3 of 2021
Page 12: figure 22 associate the color #98d4ec
with coap, unfortunately also with memcached.
Nobody knows now, how to interpret figure 22. If colors are reused, I would interpret the in the order they listed.
In 20Q4 #98d4ec
is below the yellow, pointing to memcached not coap.
in 21Q1 #98d4ec
is below the green, also pointing to memcached not coap.
Where do you see "coap" mentioned in that report? Did you check with radware, if they really identified coap? Not that this is just a misinterpretation of the color and it's memcached.
For me, this shows, that the facts are too weak. There is no evidence, that coap amplification attacks play that role.
The same applies for the
"In 2020, the FBI cyber division mentioned CoAP in a public notification warning that cyber actors are increasingly likely to abuse network protocols for DDoS attacks {{DDoS-FBI}}."
From that document:
"In December 2018, cyber actors started abusing the multicast and command transmission features of the Constrained Application Protocol (CoAP) to conduct DDoS reflection and amplification attacks, resulting in an amplification factor of 34, according to open source reporting. As of January 2019, the vast majority of Internet-accessible CoAP devices were located in China and used mobile peer-to-peer networks."
"2018, factor 34" so this is not new, it's a "echo" of the {{DDoS-ZDNET}}. Why the FBI added the "multicast" is unclear. Maybe just someone put together some terms in order to make it looking more "dangerous".
All together: Please don't collect information, which is hard to verify. Try to verify that as best as possible.
Yes, let's remove this section. The information is very vague and confusing.
Seems to be agreement to remove the text.
https://mailarchive.ietf.org/arch/msg/core/Bk6-WKWQC4kTrVnq4FDiivSYH5U/