• Privacy Policy

News & Promotions

What's going on in your world?

  • Automotive
  • Entertainment
  • Education
  • Financial
  • Health
  • Home Builder
  • Humor & Memes
  • Insurance
  • Parenting
  • Restaurants
  • Shopping
    • Coupons
    • Special Offer
  • Sports
  • Technology
  • Travel
    • Transportation
    • Weather
  • Mobile Apps
You are here: Home / Technology / BitTorrent Exploits Allow Hackers to Launch Large DDoS Attacks

BitTorrent Exploits Allow Hackers to Launch Large DDoS Attacks

August 17, 2015 By Ellen Smith

A flaw in BitTorrent clients can be exploited to allow single attackers to harness extra juice in launching DDoS attacks on a vast scale. At the USENIX conference in Washington, D.C., researchers from City University London unveiled ways that BitTorrent-based programs including uTorrent, Mainline and Vuze are vulnerable to distributed reflective denial-of-service (DRDoS) attacks.

Specifically, cyberattackers can exploit protocols used by BitTorrent — a popular way of sharing large files online through peer-to-peer networking — to reflect and amplify traffic from other users in the system.

In a paper (.PDF) dubbed “P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks,” the research team says the protocol family used by BitTorrent — Micro Transport Protocol (uTP), Distributed Hash Table (DHT), Message Stream Encryption (MSE))and BitTorrent Sync (BTSync) — are all vulnerable to exploit.

During testing, over 2.1 million IP addresses were crawled and 10,000 BitTorrent handshakes were analyzed within a P2P lab test environment. The City University London researchers were able to assault a third-party target through traffic amplified up to a factor of 50 times, and in case of BTSync, up 120 times the size of the original request.

This means that a lone attacker could exploit the system to conduct attacks on websites and companies far more debilitating than their actual computational power.

DRDoS cyberattacks hook in slave machines to participate in distributed denial of service (DDoS) attacks without user consent or knowledge. Traffic requests sent from victim systems are redirected which sends additional traffic to the target.

In turn, this can result in websites and online services unable to cope with a flood of requests, denying access to legitimate users and taking sites offline until the flow of traffic dissipates — all caused with fewer slave machines and without the cost of hiring out a botnet.

The BitTorrent protocols do not include processes to prevent IP address spoofing, which means an attacker can use peer-discovery methods including trackers, DHT or Peer Exchange (PEX) to collect millions of possible amplifiers for their DRDoS attacks. The researchers said:

“An attacker which initiates a DRDoS does not send the traffic directly to the victim; instead he/she sends it to amplifiers which reflect the traffic to the victim.

The attacker does this by exploiting network protocols which are vulnerable to IP spoofing. A DRDoS attack results in a distributed attack which can be initiated by one or multiple attacker nodes.”

In addition, “the most popular BitTorrent clients are the most vulnerable ones,” according to the team.

In March, code repository GitHub suffered a debilitating DDoS attack, the largest in the website’s history which lasted for days. Believed to originate from China, the DDoS attack involved a wide combination of attack vectors, sophisticated techniques and the use of unsuspecting victim PCs to flood GitHub with traffic in order to push GitHub to remove content from anti-censorship organization Greatfire.org and publication the New York Times.

Source link

Filed Under: Technology

Please Follow & Like Us :)

Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet
RSS

Recent Posts

Colonial Pipeline reportedly paid millions for slow-ass decryption software

When it comes to ransomware, you don't always get … [Read More...]

Advanced tax strategies for startup founders

Peyton Carr is a financial advisor to founders, … [Read More...]

Here’s How To Add Pronouns To Your Instagram Profile In A Few Simple Steps

Instagram is making it so much easier to share … [Read More...]

Copyright © 2023 · News & Promotions, 538 W. 21 St. #91289 Houston, TX 77008-3642 · All rights reserved · Unsubscribe · Log in

Go to mobile version