logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
18th May 2018 by CyberVision 0 Comments 937 Views
18th May 2018 by CyberVision in Business Security

DDos attack violating UPnP vulnerability

DDos Attack

 

A recent disclosure of a new type of Distributed Denial-of-Service (DDoS) attack takes advantage of an infamous security vulnerability in the Universal Plug and Play (UPnP) networking protocol. This exploit allows attackers to bypass common methods for detecting their actions. This new form of DDos attacks are launched from irregular source ports, making it difficult to determine their origin and blacklist the ports in order to protect against future incidents.

 

A DDoS attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. A flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, denying service to legitimate users or systems.

This new DDos exploit bypasses the UPnP, which is a set of networking protocols that enables networked devices to discover each other’s presence on the network with ease and establish a functional network. UPnP is aimed mainly at residential networks or for personal use, especially so by Internet of Things (IoT) devices, which use UPnP to find each other and communicate over a local network. This ultimately results in attackers being able to access the information on your network.

The UPnP protocols are still used, despite known issues around poor default settings, lack of authentication, and UPnP-specific remote code execution vulnerabilities, which make the devices vulnerable to attack. Mikko Hyppönen, F-Secure’s Chief Research Officer, says IoT is unavoidable. “If it uses electricity, it will become a computer. If it uses electricity, it will be online”. We can’t avoid the IoT revolution by refusing to partake in this revolution. However, protecting yourself from these threats is the only option.

 

There is a relatively simple way to protect systems from this and other UNPnP exploits. Blocking the device from being remotely accessible is the best solution, as it serves no useful function or has any benefit for device users. Everything is now a computer. Devices that were previously all wires and mechanics now run rich operating systems and more and more of them are becoming connected to the internet. If these devices aren’t patched, more targets to malicious hackers will become a prevalent issue.

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • DDoS
  • f-secure
  • f-secure cyber security
  • Mikko Hypponnen
  • Month od Mikko
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo