Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » New Loop DoS Attack Targets Hundreds of Thousands of Systems
Cybersecurity

New Loop DoS Attack Targets Hundreds of Thousands of Systems

InfovistarBy InfovistarMarch 20, 2024No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
New Loop DoS Attack Targets Hundreds of Thousands of Systems
Share
Facebook Twitter LinkedIn Pinterest Email

A novel denial-of-service (DoS) attack vector has emerged, targeting application-layer protocols based on the User Datagram Protocol (UDP). This attack, known as the Loop DoS attack, poses a significant risk to hundreds of thousands of hosts worldwide.

The approach, known as the Loop DoS attack, pairs “servers of these protocols in such a way that they communicate indefinitely,” researchers at the CISPA Helmholtz Security Centre said.

What Is the Loop DoS Attack?

The Loop DoS attack leverages the inherent characteristics of UDP, which is a connectionless protocol that does not validate source IP addresses. In this attack, the threat actor pairs two servers running vulnerable versions of certain UDP-based protocols. These servers then engage in perpetual communication with each other, creating a self-perpetuating loop.

Here’s how it works:

UDP is a connectionless protocol that does not validate source IP addresses, making it susceptible to IP spoofing.

  1. The attacker spoofs the address of one server and initiates communication with the other server.
  2. The first server responds to the victim (the second server) with an error message.
  3. The victim, in turn, responds with another error message to the first server.
  4. This back-and-forth exchange exhausts both servers’ resources, rendering them unresponsive.

Vulnerable Protocols

A recent study found that several UDP implementations, including DNS (DNS), NTP (NTP), TFTP (TTP), Active Users (AUs), Daytime, Echo (Echo), Chargen (QOTD), and Time (Time), can be used as weapons to build a self-fulfilling attack cycle.

It pairs two network services to continue to respond to each other’s messages indefinitely, said the researchers. “They generate massive amounts of traffic that results in a denial of service for the systems or networks involved. Not even the attackers can stop the attack once a single trigger is applied and the loop is triggered.”

In other words, if two application servers are running the vulnerable version of the protocol, the threat actor can communicate with the first one by spoofing the IP address of the second one, causing the first one to send an error message to the victim (the second one).

On the other hand, the victim will do the same and send another error message back to the first one, thus draining each other’s resources and causing either one of the services to fail to respond.

If an error in the input causes an error in the output, and the other system does the same, the two systems will continue to send error messages to and from each other for an indefinite time, according to Yepeng Pan and Christian Rossow.

Impact and Mitigation

Researchers estimate that approximately 300,000 hosts and their networks can be abused to carry out Loop DoS attacks. Although there is currently no evidence of widespread exploitation, the potential impact is significant. Several products from vendors such as Broadcom, Cisco, Honeywell, Microsoft, MikroTik, and Zyxel are affected.

To mitigate the risk, organizations should consider implementing measures like BCP38, which filters spoofed traffic. Additionally, staying informed about security updates and patches for affected products is crucial.

Found this article interesting? Follow us on WhatsApp and LinkedIn to read more exclusive content we post.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop Skills Required to Start Your Career in Cybersecurity
Next Article Ransomware can hide in your Websites: Danger of Uploading Files
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,687 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,687 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version