Flutterby™!
: memcached reflection attack
memcached reflection attack
2018-03-01 20:24:12.062427+01 by
Dan Lyke
0 comments
Holy shit: Akamai: memcached-fueled 1.3 TBPS attacks.
On February 27th, Akamai and other companies announced the discovery of a newly
observed reflection and amplification vector, memcached. This service is meant to cache
data and reduce the strain caused by memory intensive services. Memcached can have both UDP
and TCP listeners and requires no authentication. Since UDP is easily spoofable, it makes
this service vulnerable to use as a reflector. Worse, memcached can have an amplification
factor of over 50,000, meaning a 203 byte request results in a 100 megabyte response.
[ related topics:
Graphics Mathematics
]
comments in ascending chronological order (reverse):
Comment policy
We will not edit your comments. However, we may delete your
comments, or cause them to be hidden behind another link, if we feel
they detract from the conversation. Commercial plugs are fine,
if they are relevant to the conversation, and if you don't
try to pretend to be a consumer. Annoying endorsements will be deleted
if you're lucky, if you're not a whole bunch of people smarter and
more articulate than you will ridicule you, and we will leave
such ridicule in place.
Flutterby™ is a trademark claimed by
Dan Lyke for the web publications at www.flutterby.com and www.flutterby.net.