It has been reported that threat actors are actively exploiting memcached servers to launch Distributed Denial of Service (DDoS) attacks at record-breaking sizes. Memcached-based DDoS is a new method of attack, using memcached servers to amplify the original attack strength by up to 51,200 times.
In late February, researchers discovered the use of memcached servers for DDoS attacks. On February 28, the popular code hosting website GitHub was targeted with a 1.35 Tbps attack causing a brief outage.
On March 5, Arbor Networks reported that an undisclosed US website was targeted with the largest known DDoS attack to date, at 1.7 Tbps. Over this brief time period, attackers implemented DDoS for ransom tactics; including a ransom note inside of the bytes sent to the victim IP, offering to stop the attack. eSentire has observed an escalation in activity related to this vulnerability across our customer base.
Due to the availability of open memcached servers and the limited mitigation options, eSentire assesses with medium confidence that memcached-based DDoS attacks pose an immediate threat.
What you should do about it
* Review and apply Memcache version 1.5.6 if applicable. This release disables UDP by default.
* Review internal denial of service strategies. Have a plan in place in the event of a denial of service attack.
* Discuss denial of service strategies with service providers. Understand their capacity to withstand attacks, responsive actions and associated costs.
In the event of an attack, eSentire recommends:
* Traffic diversion to a dedicated DDoS Mitigation service using BGP or DNS based routing.
* In-line filtering, using a hardware appliance such as Web Application Firewalls (WAFs). This will provide protection against application-layer attacks.
* Identifying and disabling the attack vector(s). This may involve disabling vulnerable services or removing large files from online services.