Home / / Prolexic discovers sophisticated DDoS attack

Prolexic discovers sophisticated DDoS attack

Attacks have been launched using the itsoknoproblembro DDoS toolkit

Prolexic discovers sophisticated DDoS attack
Prolexic Technologies has discovered a sophisticated DDoS attack that the company says most mitigation providers would struggle to combat.

DDoS protection experts Prolexic Technologies has warned of an escalating threat from unusually large and highly sophisticated DDoS attacks.

These attacks were launched at the end of September using the itsoknoproblembro DDoS toolkit. According to Prolexic, the cyber-criminals behind the attacks seem to have knowledge of common DDoS mitigation methods, due to the sophisticated nature of the attack.

The attack signatures are extremely complex and Prolexic has recorded sustained floods peaking at 70 Gbps and more than 30 million pps against some of its customers. The company says that most mitigation providers would struggle to combat DDoS attacks with these characteristics.

"What we are experiencing is a dramatic uptick in the size and sophistication of DDoS attacks to a level not previously observed," said Prolexic chief executive officer Scott Hammack. "Only a handful of companies around the world could survive a hit of 70 Gbps in conjunction with the complex blend of attack vectors we have witnessed."

The itsoknoproblembro toolkit includes multiple infrastructure and application-layer attack vectors, such as SYN floods, that can simultaneously attack multiple destination ports and targets, as well as ICMP, UDP and SSL encrypted attack types, according to Prolexic. A common characteristic of the attacks is a large UDP flood targeting DNS infrastructures. Uniquely, the attacking botnet contains many legitimate (non-spoofed) IP addresses, enabling the attack to bypass most anti-spoofing mechanisms.

"The size and sophistication of this threat has created a high-alert within various industries and with good reason," said Hammack. "I'm proud to say we've successfully mitigated multiple itsoknoproblembro campaigns throughout the year, even when attack vectors have continuously modulated during the course of the assault."


Follow us to get the most comprehensive IT Security news delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.