More potent DDoS tool in development

Better bust a few more kids

  • alert
  • submit to reddit

Internet Security Threat Report 2014

An enhanced tool to script distributed denial of service (DDoS) attacks called Mstream is currently in development and may soon yield a utility capable of launching crippling assaults through far fewer infected clients than were used to disable sites and steal headlines back in February, University of Washington researcher David Dittrich has discovered. A detailed report of his findings has been posted by Packet Storm. According to the report, Mstream was discovered recently in a still-crude, buggy condition. "An Mstream agent was discovered in late April 2000 on a compromised Linux system at a major university. This system was identified to be flooding packets using forged source addresses, targeted at over a dozen IP addresses," Dittrich says. Buggy or not, Mstream apparently yields a lot of bang for the buck compared with current tools such as shaft, trin00, TFN and Stacheldraht. "An extremely small number of attack packets" were being launched. "The traffic did, however, cause the router (which served 18 subnets) to become non-responsive," the report notes. "This means that sites that do egress filtering may still suffer from these attacks themselves, even if the intended 'victim' receives fewer packets than the attacker(s) intended," the report says. As for defences, there appear not to be any at the moment, except for virus detection which is unlikely to be effective until the final code is hacked out. "The lesson here is that there is no 'quick fix' to DDoS in the form of simple technical filtering solutions," Dittrich notes. The chief security solution in effect thus far seems to be the wholesale squandering of immense international law enforcement resources in hopes of netting one or two teen-aged script kiddies. Apparently this has not been quite as effective as originally hoped. ® Related Coverage Canadian Feds charge Mafiaboy in DDoS attacks TFN author 'Mixter' sentenced FBI Web site hacked Feds charge Coolio while DDoS attackers remain at large Hacking credit cards is preposterously easy Congressional study rejects Clinton's IT security Czar, FIDNET The Mother of all DDoS attacks looms Hacking hysteria invigorates insurance industry Law enforcers the 'absolute worst people' for Net security - former Fed Janet Reno proposes on-line police squad Dot-Com firms are hacking each other -- expert Reno, FBI feast on bad network security New hack attack is greater threat than imagined

Choosing a cloud hosting partner with confidence

More from The Register

next story
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.