RE: HTTP DDoS attack on our servers

From: Golden Faron P Contr HQ SSG/SWSN (Faron.Goldenat_private)
Date: Wed Jul 09 2003 - 12:08:21 PDT

  • Next message: Piyush Bhatnagar: "Information Needed on Malicious Traffic"

    First guess is that the machines you NMAP'd are victims of W32/Graps
    worm and were remotely triggered to HTTP FLOOD your server..check the
    info at
    
    	http://vil.nai.com/vil/content/v_100467.htm
    
    Faron
    
    -----Original Message-----
    From: Markus Peter [mailto:warpat_private] 
    Sent: Tuesday, July 08, 2003 8:07 AM
    To: incidentsat_private
    Subject: HTTP DDoS attack on our servers
    
    
    Hello
    
    Since yesterday, about 8pm CET, we observe a strange phenomenon on one
    of 
    our servers, which appears like a DDoS attack. The characteristics do
    not 
    match those of the typical known UDP DDoS tools but is TCP based.
    
    Basically, > 8.000 IP numbers are sending HTTP requests to our server on
    a 
    non-HTTP port (8000), which ran an entirely different, not HTTP related 
    service on this machine. The IP numbers are mostly assigned to Europe
    and 
    North America.
    
    The requests always look the same way:
    
    GET /index.htm HTTP/1.1
    Accept: */*
    User-Agent: UserAgent
    Connection: close
    Host: <our ip number>
    
    Please note that they literally supplied "UserAgent" as User-Agent - I
    only 
    removed our ip number from the requests. Each attacking host opens
    multiple 
    connections per second. Even though the server which ran at 8000 could
    not 
    handle HTTP requests at all and immediately closed the connection after
    the 
    first sent line, the sheer number of connection attempts was enough to 
    basically force us to put the service offline, as we had over 60.000 
    concurrent TCP connections due to this.
    
    Due to the above described characteristics, I'm pretty sure that it's
    not 
    just a misguided link on some large website, but some sort of
    non-browser 
    program doing the requests.
    
    We nmapped some of the requesting machines. All of the scanned hosts
    appear 
    to be running windows, with all of them having TCP port 45836 open. If
    we 
    try connecting to that port, the connection is either immediately closed
    
    again by the remote end, or occasionally kept open indefinitely, but in 
    neither case any data is sent back to us.
    
    I'm now completely puzzled on what is happening and what kind of tool we
    
    confront. Anyone else experiences incidents like those?
    
    -- 
    Markus Peter - SPiN AG
    warpat_private
    
    
    ------------------------------------------------------------------------
    ----
    Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas,
    the 
    world's premier technical IT security event! 10 tracks, 15 training
    sessions, 
    1,800 delegates from 30 nations including all of the top experts, from
    CSO's to 
    "underground" security specialists.  See for yourself what the buzz is
    about!  
    Early-bird registration ends July 3.  This event will sell out.
    www.blackhat.com
    ------------------------------------------------------------------------
    ----
    
    
    ----------------------------------------------------------------------------
    Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the 
    world's premier technical IT security event! 10 tracks, 15 training sessions, 
    1,800 delegates from 30 nations including all of the top experts, from CSO's to 
    "underground" security specialists.  See for yourself what the buzz is about!  
    Early-bird registration ends July 3.  This event will sell out. www.blackhat.com
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Wed Jul 09 2003 - 16:12:26 PDT