A botnet of servers used for the popular gaming title Call of Duty have been hijacked and used in a 10 gigabit distributed denial of service (DDoS) attack.
The attack bombarded a small unnamed business with a UDP flood by exploiting a flaw that is still present in thousands of game servers.
The flaw meant that servers did not require a valid player session in order to process replies.
This allowed attackers to write code to send UDP packets to the victim by spoofing the IP address.
European anti-DDoS vendor VistNet, which moved to block the attack, said thousands of vulnerable sites could be found with a “quick Google search”.
Administrators could apply a patch to fix the flaw, which rate limited reply packets to a given IP address.
The fix logged an attackers’ IP address when query packets were sent, and ignored further queries for a set time.
Administrators of hacked Call of Duty 4: Modern Warfare servers had initially thought VistNet was behind the attacks. Few understood how their servers were compromised, the company said.
Cyber Resilience Summit
iTnews Executive Retreat - Security Leaders Edition
Huntress + Eftsure Virtual Event -Fighting A New Frontier of Cyber-Fraud: How Leaders Can Work Together
iTnews Cloud Covered Breakfast Summit
Melbourne Cloud & Datacenter Convention 2026



