Call of Duty botnet launches 10Gbps DDoS

Powered by SC Magazine
 

Unpatched servers used in attack.

A botnet of servers used for the popular gaming title Call of Duty have been hijacked and used in a 10 gigabit distributed denial of service (DDoS) attack.

The attack bombarded a small unnamed business with a UDP flood by exploiting a flaw that is still present in thousands of game servers.

The flaw meant that servers did not require a valid player session in order to process replies.

This allowed attackers to write code to send UDP packets to the victim by spoofing the IP address.

European anti-DDoS vendor VistNet, which moved to block the attack, said thousands of vulnerable sites could be found with a “quick Google search”.

Administrators could apply a patch to fix the flaw, which rate limited reply packets to a given IP address.

The fix logged an attackers’ IP address when query packets were sent, and ignored further queries for a set time. 

Administrators of hacked Call of Duty 4: Modern Warfare servers had initially thought VistNet was behind the attacks. Few understood how their servers were compromised, the company said.

Copyright © SC Magazine, Australia


Call of Duty botnet launches 10Gbps DDoS
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote