Call of Duty botnet launches 10Gbps DDoS

Powered by SC Magazine
 

Unpatched servers used in attack.

A botnet of servers used for the popular gaming title Call of Duty have been hijacked and used in a 10 gigabit distributed denial of service (DDoS) attack.

The attack bombarded a small unnamed business with a UDP flood by exploiting a flaw that is still present in thousands of game servers.

The flaw meant that servers did not require a valid player session in order to process replies.

This allowed attackers to write code to send UDP packets to the victim by spoofing the IP address.

European anti-DDoS vendor VistNet, which moved to block the attack, said thousands of vulnerable sites could be found with a “quick Google search”.

Administrators could apply a patch to fix the flaw, which rate limited reply packets to a given IP address.

The fix logged an attackers’ IP address when query packets were sent, and ignored further queries for a set time. 

Administrators of hacked Call of Duty 4: Modern Warfare servers had initially thought VistNet was behind the attacks. Few understood how their servers were compromised, the company said.

Copyright © SC Magazine, Australia


Call of Duty botnet launches 10Gbps DDoS
 
 
 
Top Stories
Change is the only constant at iiNet
iiNet's Matthew Toohey is trialling IBM's Watson - between preparing for an acquisition and making sure Netflix doesn't swamp the network.
 
Why straight-through processing is the holy grail for banks
Big benefits from stripping away human intervention and digitising processes.
 
CBA sued over frozen millions in IT bribery scandal
Eric Pulier's not-for profit lodges lawsuit in US.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should Optus make a bid for iiNet?

   |   View results
Yes
  44%
 
No
  56%
TOTAL VOTES: 672

Vote