DDoS flood attacks on video conferences 

B2B Cyber ​​Security ShortNews

Share post

While tools like Zoom, WebEx or Microsoft Teams have made business communication much easier during the pandemic, it also opens up a new gateway for cybercriminals for DDoS attacks, as flood attack protocols are used, according to Radware.

Video conferencing systems work with the Real Time Protocol (RTP). RTP is based on the User Datagram Protocol (UDP), a protocol that offers neither guaranteed delivery of packets nor a mechanism for handling packets out of order.

UDP is a connectionless protocol that uses datagrams embedded in IP packets to communicate without establishing a session between two devices. In other words, it doesn't require a handshake procedure. While this allows for traffic with less overhead, it also makes UDP more vulnerable to abuse and a variety of flood attacks, including UDP flood attacks.

Special anti-DDoS UDP tools required

“One cannot control such attacks with simple solutions against DDoS attacks,” warns Michael Gießelbach, Regional Director DACH at Radware. “To combat these attacks, special tools to detect and mitigate UDP floods must be implemented in the DDoS engine. This is the only way to ensure that a UDP flood attack does not affect the video conference service.”

A UDP flood attack does not exploit a specific vulnerability. Instead, the normal behavior is simply abused, to the extent that the target network is overloaded. It involves sending a large number of UDP datagrams from mostly fake IP addresses to random ports on a target server.

The server receiving this traffic is unable to process every request. The traffic consumes all of the server's bandwidth as it attempts to send ICMP replies to “destination unreachable” packets to confirm that no application is listening on the destination ports. This protocol is vulnerable to Layer 4 attacks such as B. UDP floods, UDP garbage floods, RTP floods and others.

More at Radware.com

 


About Radware

Radware (NASDAQ: RDWR) is a global leader in application delivery and cybersecurity solutions for virtual, cloud and software-defined data centers. The company's award-winning portfolio secures the company-wide IT infrastructure and critical applications and ensures their availability. More than 12.500 enterprise and carrier customers worldwide benefit from Radware solutions to quickly adapt to market developments, maintain business continuity and maximize productivity at low cost.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more