Feeds

Phlooding attack could leave enterprises high and dry

Genesis of a threat

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

You've got to hand it to the IT security industry for its ability to coin new and impressive sounding terms for security threats. Hot on the hells of WiPhishing and Evil Twins comes the latest buzz word for wireless Lan security: phlooding.

Phlooding involves a "group of simultaneous but geographically distributed attacks that targets a business's authentication or network log-in structure, with the goal of overloading its central authentication server," according to wireless security firm AirMagnet, which coined the term.

Attackers in different locations would bombard wireless access points (APs) with login requests using multiple password combinations which could slow down logins and potentially interfere with broader network operations. AirMagnet reckons businesses with multiple office locations served by a single identity management server could be particularly vulnerable to phlooding attacks.

The scenario is plausible as a way of launching denial of service attacks preventing the internal operations of a firm. But even AirMagnet admits the threat ought not to be overstated. Rich Mironov, VP of marketing at AirMagnet, said it had been aware of the possibility of the attack vector for some time but it recently uncovered evidence from security logs showing attacks based on a flood of authentication requests characteristic of phlooding. "We've seen this in the case of two unsuccessful attacks. In both cases we're not sure it was a Phlooding attack but we have a strong suspicion," Mironov explained.

Mironov said attackers would need to be in physical range of a corporate network to launch phlooding attacks adding that other wireless security risks present more likely methods of attack. "People should not lose sleep over phlooding. The vast majority of WiFi security problems remain self-inflicted. Using WiFi networks without a personal firewall, failure to configure systems or leaving Windows PCs in ad-hoc networking mode are the most common problems we see," he said.

Like the 'evil twins' risk of earlier this year phlooding is probably a well understood risk given a catchy moniker, backed by an energetic marketing campaign. There's nothing wrong with that and it certainly brightens up news of AirMagent's latest security software. AirMagnet Enterpriser version 6, a new version of its AirMagnet's wireless intrusion prevention system, includes wireless event correlation and detection methods designed to identify clusters of attacks that indicate phlooding and similar exploits are underway. ®

Related stories

Feds botch wireless security
WiPhishing hack risk warning
Hotspot paranoia: try to stay calm

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.