Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

DDoS attacks plague online gaming communities

Prolexic Technologies : 11 September, 2013  (Technical Article)
Game servers being used to channel DDoS attacks on financial services providers using reflection and amplification techniques
DDoS attacks plague online gaming communities

Prolexic has detailed the rampant problem of denial of service attacks within and from online gaming communities. The DDoS attacks, which can pack a powerful punch by the use of reflection and amplification (DrDoS) techniques, have been used against other gamers, gaming platforms and even third party targets such as financial services and other non-gaming businesses.

The availability and accessibility of online gaming infrastructures and devices creates opportunities for malicious actors to launch DDoS attacks and steal login credentials. Denial of service attacks have a long tradition in the community, occur frequently and keep evolving.

“DDoS attacks fueled by rivalries, poor password security protocols and readily available DDoS tools are widespread and harm gaming and non-gaming targets alike,” said Stuart Scholly, president of Prolexic. “There are serious repercussions for every industry from denial of service attacks that feed off the explosive growth of online gaming infrastructures.”

A Prolexic customer in the financial industry was the target of a DrDoS attack that reached 5 Gbps and made use of misconfigured game servers as intermediary victims to reflect and amplify network traffic to the financial services target, in an effort to stop it with a DDoS attack.

As is common in DrDoS attacks, the malicious actors increased the power of their DDoS attack against the financial services firm with reflection and amplification techniques. Sending a small request to one gaming server produced an outsized response that was five times larger than the initial request. The attackers co-opted hundreds of gaming servers to produce the same outsized response at once, and repeatedly, against the targeted financial services firm.

The attack was stopped by Prolexic’s DDoS mitigation service.

“This attack targeted Call of Duty 2 gaming servers across the globe – in South Africa, Europe, Asia and the United States,” explained Scholly. “PLXsert has replicated the attack in our lab.”

In the white paper, the culminating piece in a series explaining DrDoS attacks, the Prolexic Security Engineering & Response Team (PLXsert) explains:

* Why DDoS attacks occur in online gaming communities
* The history of DrDoS attacks in online gaming
* DrDoS attack tools that use gaming servers – including Quake, Half Life, and Call of Duty – to attack non-gaming targets
* A case study of a DrDoS attack against a financial services firm
* The underground market for stressors, booters and other DDoS-as-a-Service tools that target online gaming communities

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo