CyberWire Daily - A record breaking DDoS attack. [Research Saturday]

Episode Date: July 16, 2022

Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) v...ector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks." Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software. The research can be found here: CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. of you, I was concerned about my data being sold by data brokers. So I decided to try Delete.me. I have to say, Delete.me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life Thank you. JoinDeleteMe.com slash N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com slash N2K and enter code N2K at checkout. That's JoinDeleteMe.com slash N2K, code N2K. Hello, everyone, and welcome to the CyberWire's Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts
Starting point is 00:01:38 tracking down the threats and vulnerabilities, solving some of the hard problems of protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. We started seeing this attack showing up in the real world, and the patterns of the attack were interesting enough to start to dig into it more and try and figure out what exactly we were looking at. That's Chad Seaman. He's a team lead with Akamai's CERT. The research we're discussing today is titled CVE-2022-26143 TP240 Phone Home Reflection Amplification DDoS Attack Vector. attack vector.
Starting point is 00:02:36 And now, a message from our sponsor, Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible, eliminating lateral movement, connecting users only to specific apps, not the entire network, continuously verifying every request based on identity and context, simplifying security management with AI-powered automation, Thank you. more at zscaler.com slash security.
Starting point is 00:03:58 So at the core of what we're talking about today is a reflection amplification distributed denial of service attack, a DDoS attack. For those who may not be all that familiar with it, can you give us a little brief overview of exactly how a reflection amplification attack works? Yeah. So DDoS in general, I often describe it as kind of like the Christmastime rush. So, you know, if you go to a store around Christmastime, they may have 20 different lanes open for you to check out. And most likely all of those will be open and there will probably be a short line at all of them. Now, if you walk in on a random Tuesday in the middle of June, that may not be the case. There may only be one or two registers open. There may not even be any humans standing there scanning products. It may just be the self-checkout lines, right? And those lines will be manageable. A DDoS attack would basically be like a flash mob running into
Starting point is 00:04:51 a Walmart the size of a Christmas shopping crowd and then filling up all the queues without the company having time to bring on enough staff and enough hands to support that level of traffic in the physical world. A DDoS is that in a virtual format, right? A reflection attack is slightly different, only in that the attacker pretends to be the victim, and then they go out and essentially simulate a request as the victim, which initiates a response from the reflector. a request as the victim, which initiates a response from the reflector. This would be kind of like I go out and I put that you're selling gas at 55 cents a gallon, and then I put your phone number on the internet and your address, and all of a sudden people start showing
Starting point is 00:05:40 up and calling you, and now you're just overwhelmed, even though you had no intention of selling gas, or you may not even have gas, but the people calling you don't know that. All they know is the information they were given, which is, hey, if I reach out to this person, they'll sell me gas at 55 cents a gallon, so I'm going to get on that, and they're going to do it at scale. Well, let's dig into this particular effort here. what exactly were you all observing? So these attacks started to show up and they, I mean, they weren't devastating attacks, but they were concerning. It's always interesting when we see a new vector pop up. In the landscape of DDoS, especially at the scale that several of the other researchers that participated in that paper, and especially Akamai, it gets pretty boring, to be completely honest.
Starting point is 00:06:31 You see a lot of the same stuff day in and day out. So when you do start to see a new pattern or a new something pop up on your radar, it's always interesting because it means that somebody's figured something out that you haven't yet discovered. And this was the case. In this case, because of the way that reflection attacks work, like I said, you have to go forward and pretend to be a victim and talk to a service. Part of that response that that reflector sends back to the real victim once it routes across the internet is the source port of the service that is being abused. So when we start to see new source ports show up in this type of traffic, and then within the traffic itself, there are patterns that can be identified as a side effect of the protocol that they could be abusing. Those are all interesting.
Starting point is 00:07:25 that they could be abusing. Those are all interesting. So, you know, if somebody is running NTP on a weird port and we see these weird payloads coming in from a weird port or known payloads rather coming in from a weird port, it doesn't raise as many eyebrows. But when you start to see a truly new protocol or truly new content or pattern in the attack traffic also coming from ports that aren't traditionally leveraged for reflective DDoS, it kind of sounds the alarm like, oh man, okay, so there's something new out there. We don't exactly know how bad it hits, but we know that somebody is already abusing it because we're seeing it leveraged in attacks right now. And then the fact finding begins. How is this abused? Why is this abused? Is it misconfiguration? Are there a million of these
Starting point is 00:08:11 things or are there a thousand of these things? And then you have to start figuring that out in real time as you start to learn the landscape and figure out how to best fight it. And this is an interesting one. I mean, walk us through the process of how you and the other folks on this team collaborated to find out exactly what was going on here. You know, like we've said, it started showing up and looked fairly interesting. From there, using real-world attacks, we were able to passively identify some sources that we could talk to because the one thing that reflection attack can't hide is the true source of the reflection node. If we see them talking to us on, I think it was port 10,074,
Starting point is 00:08:56 we could go back to port 10,074 from an attack source that participated in an attack and start to interrogate that service running on that real machine that was leveraging an attack and start to interrogate that service running on that real machine that was leveraging the attack. So from there, once we start to communicate with that, we had no visibility into what the command structure or how that service functioned at all. We only had the payloads that were a result of somebody issuing a command to that endpoint. had the payloads that were a result of somebody issuing a command to that endpoint. So you kind of go forward and start to poke and prod and figure out what is this thing?
Starting point is 00:09:38 How do I talk to it? Thankfully for these, because of them essentially being a test interface for different capabilities of this device, if you sent anything, a question mark or a space, it would dump back a help screen. So right there, you basically had self-documentation of all the capabilities of the device. And then it became a game of, well, which one of these are they abusing? It was pretty obvious which one was being abused based on the payloads that were coming back, especially once you got the help screen. And then you start to kind of delve into that. And this was a voiceover IP system that was being taken advantage of? It was a software slash virtual device slash physical device that kind of predated like a Microsoft Teams offering. So the device itself could be purchased, and it was mostly purchased by small organizations that predated some of the platforms and stuff that we have now that allowed them kind of
Starting point is 00:10:40 a unified hub for file sharing, communications, chat. And as part of that, there was some PBX integration that allowed it to also engage in phone calls, sending and receiving, I believe. And that's what the folks were able to take advantage of, that those were opened up to the public internet. Yeah, and early on in the initial phases of this, when we kind of started to figure out what these things were, that was one of the big floating questions. You know, we found some of these devices were in very precarious networks. There were some that were linked to town's security, or not security, emergency response infrastructure.
Starting point is 00:11:30 At that point, we kind of had to start a deeper fact-finding because we weren't sure when somebody's abusing, and I'm sure we'll go into more as we discuss the research, but these devices are single-threaded. So we found that if one was being leveraged for an attack, any other attempts to communicate with that service failed. They would just hang until that attack was finished. And that led to the question of like, are people leveraging these to attack us successfully knocking down small towns,
Starting point is 00:12:06 911 infrastructure or emergency response infrastructure? And, and, you know, those, those are just some of the questions that pop up early on. And you, you kind of, those are questions you have to answer and you need to answer them fast because it really, it changes the overall threat, right? Yeah. So if somebody's DDoSing me and it's hurting, that's not good. If somebody's DDoSing me and it's taking down Tacoma, Washington's 911 operations, that's a bigger problem.
Starting point is 00:12:37 So luckily we found out that that was not the case. Thank goodness. I see. Now this attack had a particularly high, in your research, you say it was a record-setting amplification ratio. What was going on there? Yeah, so typically in these reflection attacks, the attacker has to continually engage with the reflection component. with the reflection component. So if I'm talking to, and this is in most cases, this is not 100% across the board case, but in most cases, if I'm talking to server A and I'm reflecting traffic at victim Z, I need to send a packet to server A, which in turn triggers a response to victim Z.
Starting point is 00:13:29 A, which in turn triggers a response to victim Z. In this case, because of this being a test facility that was exposed and leveraged UDP, you could basically send a single request, and that request would be processed by that test facility that would result in millions of packets exiting the reflector node, targeting the victim. Was this the result of a configuration error, or was this something overlooked in how the system was designed? This is an older system, yes? Yeah. You know, when I first started testing it, so pretty early on, once we started to identify what the device was, reaching out to the manufacturer and trying to get the ball rolling on cleaning stuff up, like I said, there is a virtual device component of this product.
Starting point is 00:14:20 So we were able to actually get copies of the OVA images and deploy virtual devices. And in my initial deployment of a virtual device, it wasn't vulnerable. And what I found was that during the setup phase, it asks for a public interface and a private interface, and then it exposes certain things depending on that. interface and a private interface, and then it exposes certain things depending on that. And if a user during the configuration phase had configured it to use the public IP address as both the public and private interfaces, then this misconfiguration occurred. And basically, this testing card thought, well, this is my private internal interface, so I can expose everything to it. Or so is my relatively hot take. I haven't really dug super deep into exactly how they get into this configurable state. But in my early testing, that was something I discovered. Because I'm like, great, I've got this virtual device.
Starting point is 00:15:18 Let me just start beating on it. And it's not working. So, yeah. Yeah, that's fascinating. Well, where do we stand in terms of mitigation? Do standard DDoS defense tools work against this? Yeah, I mean, if you're engaged in upstream filtering and that kind of stuff to shed traffic, then you're going to be okay. The problem is it's a volumetric attack. So if it's possible to overwhelm your total bandwidth anywhere in the upstream, you're going to be hurting regardless
Starting point is 00:15:54 and your mitigation options are rather limited if they can push enough traffic. All the standard plays that you would use, like I've said, is ddos is fairly boring because you see the same thing over and over and over again and a new reflection attack is interesting in that it's new but it's not interesting in that it's all that unique the the unique part about this one was the one attacker packet can result in 220 billion amplification rate but at the end of the day, if you were to still do source port blocking of traffic and ACLs and a lot of the standard playbooks, you would be okay so long as you had enough bandwidth to support up to your mitigation gear. Now, you've been in touch with the manufacturer of this device that's being taken advantage of here. What's their response been?
Starting point is 00:17:14 And then as we further that discussion and went down that rabbit hole, it became clear that while they had been made aware of the problem, they weren't fully aware of the severity of the problem. Like I said, in the initial interaction with the device, if you send anything, even a single byte, you get back, I think, like 64 bytes or 128 bytes of response that is that help message. It's basically an error message followed by the help message, which, you know, yeah, that's a reflection and amplification concern, but they weren't aware that using some of these other test interfaces that that service exposed really pushed it up to record setting levels of potential. Once that was more thoroughly explained, they were very proactive and cooperative in going through the process of trying to identify their customers and contact them. and contact them. And it was tricky because they create the devices, and on top of that, it's a legacy device that I don't think they really sell anymore and don't even support really.
Starting point is 00:18:14 But they also have partnerships, and those partnerships were also partially responsible for the selling, configuration, deployment, and management of some of these devices. So it became kind of a game of whack-a-mole of trying to track down all the devices that we could identify on the network, on the internet, sorry, which network that those devices lived on, and then whose responsibility or what contractual agreement they have on the backside of their business that will ultimately get them in a position to be able to talk to the customer that has deployed that device. So it was a little bit tricky. We had actually planned to go public with our findings earlier, but once we got involved with the contacts at Metel, basically we stretched out that timeline to provide them with more time and opportunity
Starting point is 00:19:16 to clean up and try and get customers notified and patches put in place and firewalls spun up and everything that comes with responsible disclosure. It really does seem like one of those tricky sorts of things, particularly when you're working with legacy equipment like this. I would imagine there are a lot of organizations who have things kind of running behind the scenes and they probably think to themselves, well, we're not sure how much this is being used, but we might as well leave it running because it's not really going to hurt anything. Yeah, yeah. And it's funny because while we spotted the abuse because of it being leveraged for attack,
Starting point is 00:19:57 that's also ultimately how Metel was made aware of it initially, was because companies have these things deployed, and who knows how long they've been there or if they're still actively being used. But when somebody is abusing them for DDoS, it shows up in your outbound traffic. So suddenly you start seeing this device on your network and it's consuming massive amounts of outbound traffic. And that ultimately was what kind of raised up one of their customers' ears that notified them of this problem. And then as those attacks became more prevalent and we started seeing them show up across our borders, targeting our customers and such,
Starting point is 00:20:42 it became a case of, oh, okay, well, you know this is there, and your customers are telling you it's abused, and they were proactively trying to get it fixed before we even reached out to them, but they just didn't understand the severity of it. So it was definitely tricky. One of the things that strikes me about this is the degree to which One of the things that strikes me about this is the degree to which the research and the mitigation, as you mentioned at the outset, was it's just really a task force. There are a lot of it's practically a who's who of research teams who collaborated on this. Can you touch on the importance of that, of sharing this sort of information across the industry? Yeah. So within the industry, there are some smaller groups that kind of try to collaborate. And I've discussed this in some interviews in the past and such
Starting point is 00:21:33 about some of these working groups that have spun up. And it's because DDoS is, you know, it's not just an Akamai problem, right? It's an everyone problem. And in some cases, it kind of also needs to be an everyone solution. We can sit back and mitigate some of these attacks, all of these attacks up to this point without any problem or any concerns, but you might not be able to, and somebody else might not be able to. it really does become a bigger question of, well, we should probably fix this for all of us. And that's kind of the driving force behind some of these collaborative efforts. So while we are direct competitors across a particular industry, we're also interested in making sure the internet stays up and functional
Starting point is 00:22:26 and healthy and, you know, no single group or bad actor can come around and start really causing widespread pain for everyone. Our thanks to Chad Seaman from Akamai for joining us. The research is titled TP-240 Phone Home Reflection Amplification DDoS Attack Vector. We'll have a link in the show notes. Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide.
Starting point is 00:23:16 ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default deny approach can keep your company safe and compliant. Thank you. White, Puru Prakash, Justin Sabey, Tim Nodar, Joe Kerrigan, Carol Terrio, Ben Yellen, Nick Vilecki, Gina Johnson, Bennett Moe, Chris Russell, John Petrick, Jennifer Iben, Rick Howard, Peter Kilby, and I'm Dave Bittner. Thanks for listening. We'll see you back here next week.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.