Time puts servers at risk of denial-of-service attacks

IT security

Time puts servers at risk of denial-of-service attacks

Cliff Saran

The Network Timing Protocol (NTP), which is used to keep servers on the internet synchronised, could become a major vector of attack for hackers.

Cisco researchers have warned that the NTP Is a weak link and could be targeted for distributed denial-of-service (DDoS) attacks.

hacking.jpg

Although this is a new type of attack, Cisco expects hackers to exploit the weaknesses in NTP.

The researchers warned that an increasing number of attack tools, designed to target the growing number of vulnerable NTP servers, were being distributed among the hacker community.

The Cisco 2014 Midyear Security Report, said: "OpenNTPProject.org, an NTP scanning project designed to increase awareness about the NTP problem, has identified more than one million vulnerable NTP servers. Combined, the bandwidth of these servers is likely to be larger than in any DDoS attack seen to date."

The report highlighted a significant NTP amplification attack that occurred in the first half of this year, which targeted a customer of global DNS provider CloudFlare. “At its peak, the February attack reached nearly 400Gbps of UDP traffic,” Cisco said.

Cisco's research is based on a study of 16 multinational organisations which, as of 2013, collectively controlled more than $4tn in assets, with revenues in excess of $300bn.

The survey also found that 44% of the customer networks observed in 2014 issued DNS requests for sites and domains with devices that provide encrypted channel services. Cisco says this suggests that the networks had been compromised and hackers were using the encrypted channel services to cover their tracks.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy