Fewer NTP servers can be abused to amplify DDoS attacks, but threat remains

Despite visible progress 2,000 servers with large amplification factors remain, a security vendor reports

The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.

DDoS (distributed denial of service) amplification is an attack technique that involves tricking insecure servers into flooding a target with unrequested data. The method works with several protocols, including DNS (Domain Name System), SNMP (Simple Network Management Protocol) and NTP, that are vulnerable to IP address spoofing by design.

Attackers can send small requests with a forged source IP address to unprotected servers over these protocols to trigger the return of significantly larger responses to the spoofed address, which typically belongs to the intended victim.

In the case of NTP, attackers can use a command called monlist to force servers to respond with the IP addresses of up to the last 600 machines that queried them -- a large response compared to the original query -- allowing them to amplify the traffic they can generate.

In February, content delivery network CloudFlare reported that its infrastructure was the target of a DDoS attack that peaked at almost 400Gbps and which was the result of NTP-based amplification.

In December, NSFOCUS Information Technology, a network security company based in Beijing, ran an Internet-wide scan and found 432,120 vulnerable NTP servers worldwide. Of those servers, 1,224 were capable of amplifying traffic by a factor greater than 700.

The company repeated its scans in March and May with dramatically different results. In March, NSFOCUS found only 21,156 NTP servers that were still vulnerable to DDoS amplification abuse and their number further decreased to 17,647 in May.

The sharp decline indicates that many network and system administrators have taken steps to restrict access to the monlist feature on their NTP servers, the company said in a report Monday.

The U.S. Computer Emergency Response Team (US-CERT) posted an advisory in January with instructions on how to secure NTP servers by upgrading them to a version newer than 4.2.7 or by disabling monlist manually.

The decline in the number of vulnerable NTP servers observed by NSFOCUS was correlated by researchers from the SANS Internet Storm Center (ISC) using their own data.

"I'd like to suggest that while pundits are citing slow progress for patching Heartbleed, that in actuality, the Heartbleed issue is responsible for the sudden change," said Kevin Shortt, an incident handler at ISC, Monday in a blog post. "The month of May showed an extensive effort for patching and truing up patch levels because of Heartbleed. This effort likely assisted in the NTP issue being patched along with it."

However, the danger that insecure NTP servers pose to the Internet is not completely gone. According to NSFOCUS's data the number of vulnerable servers with an amplification factor of over 700 has actually increased since December, to 2,100.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags SANS Technology InstitutefirewallsNSFOCUS Information Technologyonline safetysecurityExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?