DDoS flood attacks on video conferences 

B2B Cyber ​​Security ShortNews
Advertising

Share post

While tools like Zoom, WebEx or Microsoft Teams have made business communication much easier during the pandemic, it also opens up a new gateway for cybercriminals for DDoS attacks, as flood attack protocols are used, according to Radware.

Video conferencing systems work with the Real Time Protocol (RTP). RTP is based on the User Datagram Protocol (UDP), a protocol that offers neither guaranteed delivery of packets nor a mechanism for handling packets out of order.

Advertising

UDP is a connectionless protocol that uses datagrams embedded in IP packets to communicate without establishing a session between two devices. In other words, it doesn't require a handshake procedure. While this allows for traffic with less overhead, it also makes UDP more vulnerable to abuse and a variety of flood attacks, including UDP flood attacks.

Special anti-DDoS UDP tools required

"Simple solutions against DDoS attacks are not enough to combat these attacks," warns Michael Gießelbach, Regional Director DACH at Radware. "To combat these attacks, special tools for detecting and defusing UDP floods must be implemented in the DDoS engine. This is the only way to ensure that a UDP flood attack does not affect the video conferencing service."

Advertising

A UDP flood attack does not exploit a specific vulnerability. Instead, the normal behavior is simply abused, to the extent that the target network is overloaded. It involves sending a large number of UDP datagrams from mostly fake IP addresses to random ports on a target server.

The server receiving this traffic is unable to handle every request. The traffic consumes all of the server's bandwidth as it attempts to send ICMP responses to "destination unreachable" packets to confirm that no application is listening on the destination ports. This protocol is vulnerable to Layer 4 attacks such as UDP floods, UDP garbage floods, RTP floods, and others.

More at Radware.com

 


About Radware

Radware (NASDAQ: RDWR) is a global leader in application delivery and cybersecurity solutions for virtual, cloud and software-defined data centers. The company's award-winning portfolio secures the company-wide IT infrastructure and critical applications and ensures their availability. More than 12.500 enterprise and carrier customers worldwide benefit from Radware solutions to quickly adapt to market developments, maintain business continuity and maximize productivity at low cost.


 

Matching articles on the topic

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Healthcare facilities: 90 percent are at high risk

The current report “State of CPS Security: Healthcare Exposures 2025” shows the most dangerous vulnerabilities of medical devices in networks of ➡ Read more

Google Cloud Run: ImageRunner vulnerability discovered

The ImageRunner privilege escalation vulnerability in Google Cloud Run could have allowed attackers to bypass access controls, gain unauthorized access to container images ➡ Read more