Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains

Despite visible progress 2,000 servers with large amplification factors remain, a security vendor reports

The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.

DDoS (distributed denial of service) amplification is an attack technique that involves tricking insecure servers into flooding a target with unrequested data. The method works with several protocols, including DNS (Domain Name System), SNMP (Simple Network Management Protocol) and NTP, that are vulnerable to IP address spoofing by design.

Attackers can send small requests with a forged source IP address to unprotected servers over these protocols to trigger the return of significantly larger responses to the spoofed address, which typically belongs to the intended victim.

In the case of NTP, attackers can use a command called monlist to force servers to respond with the IP addresses of up to the last 600 machines that queried them -- a large response compared to the original query -- allowing them to amplify the traffic they can generate.

In February, content delivery network CloudFlare reported that its infrastructure was the target of a DDoS attack that peaked at almost 400Gbps and which was the result of NTP-based amplification.

In December, NSFOCUS Information Technology, a network security company based in Beijing, ran an Internet-wide scan and found 432,120 vulnerable NTP servers worldwide. Of those servers, 1,224 were capable of amplifying traffic by a factor greater than 700.

The company repeated its scans in March and May with dramatically different results. In March, NSFOCUS found only 21,156 NTP servers that were still vulnerable to DDoS amplification abuse and their number further decreased to 17,647 in May.

The sharp decline indicates that many network and system administrators have taken steps to restrict access to the monlist feature on their NTP servers, the company said in a report Monday.

The U.S. Computer Emergency Response Team (US-CERT) posted an advisory in January with instructions on how to secure NTP servers by upgrading them to a version newer than 4.2.7 or by disabling monlist manually.

The decline in the number of vulnerable NTP servers observed by NSFOCUS was correlated by researchers from the SANS Internet Storm Center (ISC) using their own data.

"I'd like to suggest that while pundits are citing slow progress for patching Heartbleed, that in actuality, the Heartbleed issue is responsible for the sudden change," said Kevin Shortt, an incident handler at ISC, Monday in a blog post. "The month of May showed an extensive effort for patching and truing up patch levels because of Heartbleed. This effort likely assisted in the NTP issue being patched along with it."

However, the danger that insecure NTP servers pose to the Internet is not completely gone. According to NSFOCUS's data the number of vulnerable servers with an amplification factor of over 700 has actually increased since December, to 2,100.

Join the CSO newsletter!

Error: Please check your email address.

Tags SANS Technology InstitutefirewallsNSFOCUS Information Technologyonline safetysecurityExploits / vulnerabilities

More about CERT AustraliaComputer Emergency Response TeamSNMPTechnology

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts