figures
Blog

IoT Devices Using CoAP Increasingly Used in DDoS Attacks

Admin Globaldots
11.03.2019
image 1 Min read

IoT devices in synchronised attacks on targets represent a growing part of global Distributed Denial of Service (DDoS) weapon arsenals. There is a significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks.

The A10 Networks report on the state of DDoS weapons in the first quarter of 2019 examines the types of weapons and attacks being used and where they are coming from. While the most prevalent types of weapons leverage other more established technologies and internet protocols, such as the Network Time Protocol (NTP), Domain Name System (DNS) resolvers, and the Simple Services Discovery Protocol (SSDP), CoAP-based devices represent a fast-emerging new weapon type in botnet arsenals.

The most common type of attack utilising many of these weapons is a reflective amplification attack through which attackers spoof a target’s IP address and send out requests for information to vulnerable servers that then send amplified responses back to the victim’s IP address overwhelming the capacity of the target’s servers.

CoAP is a lightweight machine-to-machine (M2M) protocol that can run on smart devices where memory and computing resources are scarce. From a DDoS perspective CoAP is a protocol which is implemented for both TCP and UDP and does not require authentication to reply with a large response to a small request. The latest A10 Networks report found that over 400,000 of the weapons are being used in attacks.

Read more: Help Net Security

Comments

0 comments

There’s more to see

slider item
Cloud Web Application Firewalls (WAF)
Webinar: Safer, Smarter – Cloud WAF 2.0 (Hebrew)
Dror Arie 18.10.21

Cloud transformation is an opportunity to implement a WAF that fits your new, agile IT infrastructure. Appliance-based WAF, or a migrated one, is insufficient for 2021’s security challenges. However, many organizations are concerned that the current range of Cloud WAFs is insufficient for their needs. Starting today, this concern belongs in the past. In this […]

Read more
slider item
Your Innovation Feed
Hear It From 3 Security Leaders: How Security Can Accelerate Business
Dror Arie

Which is more important: security or speed? This question has long been a source of concern for businesses worldwide, and it can leave many organizations vulnerable to hacks in the name of doing things fast and improving employee work experience.  Starting today, to foster corporate security and growth, you do not need to compromise your […]

Read more
slider item
Bot Mitigation & Anti-Fraud
Case Study: Retailers Saves $500K/mo with Anti-Bot Innovation
Dr. Eduardo Rocha 14.10.21

Today’s bots are too clever for CAPTCHAs. Yet, their financial and reputational damage potential is sometimes immeasurable. eCommerce retailers are left helpless, with overwhelming compute overspend and fraud costs: Bots can be responsible for up to 99.8% of an online store’s traffic. Credential stuffing campaigns can generate 250,000 requests per hour.  Fraudulent transactions may cost […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure

Don’t Fortify. Amplify | Cloud Security Reimagined