Call of Duty botnet launches 10Gbps DDoS

Powered by SC Magazine
 

Unpatched servers used in attack.

A botnet of servers used for the popular gaming title Call of Duty have been hijacked and used in a 10 gigabit distributed denial of service (DDoS) attack.

The attack bombarded a small unnamed business with a UDP flood by exploiting a flaw that is still present in thousands of game servers.

The flaw meant that servers did not require a valid player session in order to process replies.

This allowed attackers to write code to send UDP packets to the victim by spoofing the IP address.

European anti-DDoS vendor VistNet, which moved to block the attack, said thousands of vulnerable sites could be found with a “quick Google search”.

Administrators could apply a patch to fix the flaw, which rate limited reply packets to a given IP address.

The fix logged an attackers’ IP address when query packets were sent, and ignored further queries for a set time. 

Administrators of hacked Call of Duty 4: Modern Warfare servers had initially thought VistNet was behind the attacks. Few understood how their servers were compromised, the company said.

Copyright © SC Magazine, Australia


Call of Duty botnet launches 10Gbps DDoS
 
 
 
Top Stories
Hacks and frauds can't dampen Bitcoin buzz
[Blog post] Enthusiasts meet in Melbourne.
 
Qantas checks in with cloud computing
Impressed with results of public cloud bake-off.
 
Corrupt NSW Education IT contractor jailed
ICAC investigation goes all the way to Long Bay.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  22%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 497

Vote