DDoS Attacks Leverage UPnP Protocol to Avoid Mitigation
By Catalin Cimpanu | May 15, 2018
Attackers are experimenting with a new method of avoiding some DDoS mitigation solutions by employing the Universal Plug and Play (UPnP) protocol to mask the source port of network packets sent during the DDoS flood.
In a report published on Monday, DDoS mitigation firm Imperva says it observed at least two DDoS attacks employing this technique.
By masking the origin port of incoming network packets, Imperva says that older DDoS mitigation systems that rely on reading this info to block attacks will need to be updated to more complex solutions that rely on deep packet inspection (DPI), a more costly and slower solution.
…
The technique is, no doubt, going to become more popular as time passes by. Just like when the UPnProxy flaw came to light, router owners are advised to disable UPnP support if they are not using the feature.
Read the full article here
