2014 will be a pivotal year for Enterprise Security professionals. Large scale Denial of Service ( DoS ) and Distributed Denial of Service attacks ( DDoS ) have been increasing over the years, which is nothing new. As technology evolves, including faster machines and cheaper bandwidth, attacks will also evolve just as fast if not a little faster. What is alarming is the dramatic increase in the size of these DoS and DDoS attacks over the last year. These attacks are nothing to sneeze at, and in fact, are down right scary. Most of these attacks can cripple even the biggest of Enterprises due to their sheer size. This will require Enterprise Security professionals to take a serious look at their security plans for 2014.
2013 saw the largest DDoS attack on record, with the 300gbps attack on the Anti-Spam site Spamhaus. 2014 has also started off quickly with a large NTP reflection attack. Jaeson Schultz has a great article on this topic, available here. This isn’t the start of the year the Enterprise Security professional wants to see. But it’s a real threat, and any Enterprise needs to have plans in place to handle this type of situation so can keep service available for their clients.
How Enterprise Security professional handle this type of nightmare can lead to some sleepless nights. With the amount Read More »
Tags: #ciscochampion, DDoS, Denial of Service attack, distributed denial of service, enterprise class security, NTP
In October 2013, Cisco TRAC discussed Network Time Protocol (NTP) as a possible vector for amplified distributed denial of service (DDoS) attacks. Litnet CERT has since revealed that their NTP servers were used in a denial of service (DoS) attack. Symantec also published information regarding an NTP amplification-based DDoS attack that occurred in December 2013. On December 7, 2013, a hackforums.net user posted an NTP amplification DDoS script to Pastebin. The NTP DDoS script is heavily obfuscated Perl, though the plain text at the top credits the “leaking” of the script to an individual who goes by the handle Starfall. Brian Krebs also mentioned someone going by the name Starfall as a paying user of booter.tw. They may be the same person.
Decoding the obfuscated Perl yields some interesting insights. For example, this code near the top of the script has nothing to do with the NTP DDoS functionality:
The code above downloads a program called spoof.pl from IP 188.8.131.52, then runs and erases that program while writing the text “j00 g0t 0wn3d s0n” into a hidden file. Unfortunately, we were unable to obtain a copy of the spoof.pl script, but the ominous “j00 g0t 0wn3d s0n” text indicates the purpose of the program was likely to compromise the machine of anyone who was running the obfuscated NTP DDoS script. Is there no honor among hackers?
Read More »
Tags: DDoS, distributed denial of service, dos, NTP, security
I had the pleasure of meeting with a number of Biomedical Engineering and Clinical Engineers at CIMIT (Center for Integration of Medicine and Innovative Technology) in Cambridge this week. Lot’s to tell you (more to come), but perhaps nothing more timely then “time” itself. With the eventual “Meaningful Use” requirement to include the integration of Medical Devices to your EHR as a means to correlate patient vitals over time – we have big problems looming as an industry.
Under the direction of Dr. Julian Goldman at CIMIT, researcher Pratyusha Mattegunta, MS, BME and team examined 100’s of medical devices across a particular healthcare system – most of which were network attached. What the team found was an overwhelming number of medical devices with incorrect time and date. Some devices in fact were running some “very advanced firmware” that was able to predict the patient’s condition — Sometimes as much as 6+ months into the future! Read More »
Tags: biomedical, biomedical engineering, CIMIT, clinical engineering, Meaningful use, Medical Device, NTP, sentinel event