Warning given of powerful new DDoS attack vector affecting IoT, as industry aims to build trust

Nick Cook, CIO of Intercede

A new zero-day attack vector could be used to enhance the effectiveness of botnet tools used to launch recent attacks on Dyn, Krebs on Security and OVH. So says Corero Network Security (LSE: CNS).

Corero, a provider of security solutions against DDoS attacks, has disclosed a significant new zero-day DDoS attack vector observed recently for the first time in use against its customers. As Jeremy Cowan reports, the new technique is an amplification attack, which utilises the Lightweight Directory Access Protocol (LDAP), one of the most widely used protocols for accessing username and password information in databases like Active Directory, which is integrated with most online servers.

While Corero’s team of DDoS mitigation experts has so far only observed a handful of short but “extremely powerful attacks” against their protected customers originating from this vector; the technique reportedly has the potential to inflict significant damage by leveraging an amplification factor seen at a peak of as much as 55x.

If combined with the Internet of Things (IoT) botnet that was utilised in the recent 655 Gigabyte attack against Brian Krebs’s website, Corero believes we could soon see new records broken in the DDoS attack landscape, with the potential to reach tens of Terabits per second in size in the not too distant future.  The DDoS landscape has been extremely volatile in recent weeks, particularly with the release of the Mirai code and subsequent Mirai-infected IoT devices, and Corero expects this trend to continue for the foreseeable future.

Dave Larson, CTO and COO at Corero Network Security, explains: “This new vector may represent a substantial escalation in the already dangerous DDoS landscape, with potential for events that will make recent attacks that have been making headlines seem small by comparison. When combined with other methods, particularly IoT botnets, we could soon see attacks reaching previously unimaginable scale, with far-reaching impact.”

Dave Larson, Corero Network Security
Dave Larson, Corero Network Security

In this case, the attacker sends a simple query to a vulnerable reflector supporting the Connectionless LDAP service (CLDAP) and using address spoofing makes it appear to originate from the intended victim. The CLDAP service responds to the spoofed address, sending unwanted network traffic to the attacker’s intended target.

New working group to advance IoT security

Meanwhile, the prpl Foundation has formed the Trust Continuum working group. The prpl Foundation is an open source, community-driven, collaborative, non-profit foundation with a focus on enabling next-generation data centre-to-device portable software and virtualised architectures.

This initiative will be chaired by Nick Cook, CIO of digital trust specialist, Intercede, a foundation member company. Its purpose is to provide the guidance, application program interfaces (APIs), and a framework needed for developers and manufacturers to establish end-to-end trust in embedded devices, critical to the security of IoT.

“In a highly connected world, it is vital that a chain of trust can be established from the silicon of an embedded device right through to the provisioning of the service itself in order for mutual trust to be achieved,” said Art Swift, president of the prpl Foundation. “We call this the Trust Continuum, and it ensures the high integrity of these digital exchanges required to stop malware or other subversive actors from compromising them. This trust is a critical element missing from IoT as it stands today and why threats, such as the Mirai IoT malware that has infected nearly half of a million devices, have been so successful.”

The Trust Continuum working group brings together numerous prpl member companies including Intercede, Intrinsic ID, Imagination Technologies, Kern Konzept, and Synopsys to define the “trust” stack that must be achieved to then break it down into the APIs needed within an embedded device. Once the APIs are agreed, the Trust Continuum group will define the interface specification to enable interoperability between the different components of an embedded device and cloud services.

“IoT will become ubiquitous and has the potential to dramatically change the way we live our lives. But if the security of IoT is not properly architected, the invasion into our privacy and the threat to our safety by malicious actors could cripple the connected society,” said Nick Cook. “An open and interoperable Trust Continuum is at the heart of securing these systems, enabling strong digital trust to be built between entities and importantly enabling the management of trust relationships securely throughout the lifetime of devices.”

Jeremy Cowan is the editorial director and publisher of IoT Now, IoTGlobalNetwork.com, and VanillaPlus.

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

 

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

Nozomi Networks and Tripwire announce strategic partnership

Posted on: September 17, 2021

Nozomi Networks Inc., the provider of OT and IoT security, and Tripwire, a global provider of security and compliance solutions for enterprises and industrial organisations, announced they have partnered to help organisations lower cyber risk with consistent security controls that span their IT, OT and IoT environments.

Read more

RightIndem deploys enterprise-grade conversational AI to simplify customer claims process

Posted on: September 17, 2021

RightIndem, an global insurance technology company, has worked with Bristol-based Amdaris to simplify its customer onboarding process via developing enterprise-grade conversational Artificial Intelligence experiences.

Read more