Memcached

Memcached can speed up websites, but a Memcached server can also be exploited to perform a DDoS attack.

What is a memcached DDoS attack?

A memcached distributed denial-of-service (DDoS) attack is a cyber attack in which an attacker attempts to overload a targeted victim with internet traffic. The attacker spoofs requests to a vulnerable UDP memcached server, flooding a targeted victim with internet traffic, and potentially overwhelming the victim’s resources. While the target’s internet infrastructure is overloaded, new requests cannot be processed, and regular traffic cannot access the internet resource, resulting in denial-of-service.

Memcached is a database caching system for speeding up websites and networks.

How does a memcached attack work?

A Memcached attack operates similarly to all DDoS amplification attacks, such as NTP amplification and DNS amplification. The attack sends spoofed requests to a vulnerable server, which then responds with more data than the initial request, magnifying the traffic volume.

Memcached amplification can be thought of in the context of a malicious teenager calling a restaurant and saying, “I’ll have one of everything; please call me back and tell me my whole order.” When the restaurant asks for a callback number, the targeted victim’s phone number is given. The target then receives a call from the restaurant with much information they didn’t request.

This amplification attack method is possible because memcached servers can use the UDP protocol. UDP is a network protocol that allows for sending data without first getting what’s known as a handshake, which is a network process where both sides agree to the communication. UDP is utilized because the targeted host is never consulted on whether or not they’re willing to receive the data, allowing for a massive amount of data to be sent to the target without their prior consent.

A memcached attack occurs in 4 steps:

  1. An attacker implants a large payload* of data on an exposed memcached server.
  2. Next, the attacker spoofs an HTTP GET request with the IP address of the targeted victim.
  3. The vulnerable memcached server that receives the request, which is trying to be helpful by responding, sends a large response to the target.
  4. The targeted server or its surrounding infrastructure cannot process the large amount of data sent from the memcached server, resulting in overload and denial of service to legitimate requests.

This is a 260 GB per second memcached attack against Cloudflare’s network being mitigated

How big can a memcached amplification attack be?

The magnification factor of this type of attack is truly staggering; in practice, we have witnessed amplification factors of up to a whopping 51,200x! That means that for a 15-byte request, a 750 kB response can be sent. This represents a massive amplification factor and security risk to web properties that cannot shoulder the weight of this volume of attack traffic. Such a large amplification factor coupled with vulnerable servers makes memcached a prime use case for attackers looking to launch DDoS against various targets.

How can a memcached attack be mitigated?

  1. Disable UDP – For memcached servers, disable UDP support if you do not need it. By default, memcached has UDP support enabled, potentially leaving a server vulnerable.
  2. Firewall memcached servers – by firewalling memcached servers from the Internet, system administrators can use UDP for memcached if necessary without exposure.
  3. Prevent IP spoofing – as long as IP addresses can be spoofed, DDoS attacks can use the vulnerability to direct traffic to a victim’s network. Preventing IP spoofing is a larger solution that any particular system administrator cannot implement, and it requires transit providers not to allow any packets to leave their network that have a source IP address originating outside the network. In other words, companies such as internet service providers (ISPs) must filter traffic such that the packets that leave their network are not allowed to pretend to be from a different network somewhere else. If all major transit providers implemented this type of filtration, spoofing-based attacks would disappear overnight.
  4. Develop software with reduced UDP responses – another way to eliminate amplification attacks is to remove the amplification factor to any incoming request. If the response data sent due to a UDP request is smaller than or equal to the initial request, amplification is no longer possible.

Nord VPN
60% off Nord VPN
Coinbase - Getty Images - 1234552839
Coinbase – Crypto Currency – Sign up with this link and get $10 free?! Buy/sell/exchange crypto, and use their ATM card to access your cash easily!
Chase Sapphire Preferred - Travel Points
NordPass - Password Manager - CJ Banner
https://www.dpbolvw.net/click-100604079-15345170
Binance Cryptowallet - Buy/Sell
Binance Blockchain
Amazon - Daily Deals
Amazon’s Daily Deals!
Your favorite restaurants are delivered to your front door! Grubhub!
Game Fly
Game Fly Video Game Rentals!