Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Tales from the Ops Side - Denial of Sleep

Tales from the Ops Side - Denial of Sleep

In the first few months of 2016, our network was subjected to several seemingly unrelated DDoS attacks launched against various clients. Continuing our Tales from the Ops side series, these stream of events robbed us of our sleep, time, and money, and included extortion letters, bitcoin, and even encounters with the FBI.

VM Farms Inc.

May 29, 2017
Tweet

More Decks by VM Farms Inc.

Other Decks in Technology

Transcript

  1. Denial of Sleep Tales from the Ops Side By Hany

    Fahim Founder and CEO @iHandroid @vmfarms
  2. Alert - 10:26 pm ET Saturday night. Received multiple pages

    for downed hosts. Usually symptomatic of a network outage of sorts. Got on the phone with our upstream (Tier 1). We were under a DDoS attack.
  3. Attack! Size 10 GBits Target Alpha Client Duration 7 min

    Signature Distributed UDP-Based Random src/dest ports
  4. Russian Federation - 28.3% Romania - 26.4% Ukraine - 17.0%

    Bulgaria - 5.7% Andorra - 3.8% Sweden - 3.8% October 17, 2015
  5. Network Connections 5 things are required to establish a network

    connection: Source IP Source Port Destination IP Destination Port Protocol (TCP, UDP, etc…)
  6. TCP vs. UDP TCP is stateful: TCP requires a handshake

    to be negotiated. All packets must be acknowledged. Easy to track connection lifecycle. High overhead.
  7. TCP vs. UDP UDP is stateless: UDP does not require

    a handshake. Packets don’t have to be acknowledged. Difficult to track lifecycle. Low overhead. udp User Datagram Protocol
  8. Common Attacks Because of its stateless nature, UDP-based attacks very

    common and very damaging. TCP attacks are still plentiful (SYN Floods).
  9. Shields Up! Asked Tier 1 to block all UDP traffic

    destined for Alpha Client. Successfully mitigated the attack in 7 min. Kept block in place for 24 hrs after attack subsided.
  10. CloudFlare is a CDN and security company. DNS-based Proxy Service.

    Acts as a go-between yourself and end-users. Worked with Alpha Client to implement CloudFlare
  11. Alert - 3:47pm ET Middle of the work day. Multiple

    pages for downed hosts. Called Tier 1 immediately. We were under attack again.
  12. Attack! Size 12 GBits Target Beta Client Duration 25 min

    Signature Distributed UDP-Based All port 0
  13. Russian Federation - 45.8% Ukraine - 6.0% Brazil - 5.4%

    Czechia - 5.4% Romania - 5.4% Poland - 4.8% December 8, 2015
  14. Shields Up! Port 0 is an invalid port. Due to

    the signature, it was easy to setup a filter. Asked Tier 1 to block all UDP/0 traffic cluster-wide. Successfully mitigated the attack in 25 min. Kept block in place for 24 hrs after attack subsided.
  15. + Attacks can happen anytime and to anyone. Using a

    partnership, bring discounts to clients. Includes a free tier. Offered to help in the migration.
  16. Herd Immunity In order to be effective, most clients need

    to implement. Attack surface area is reduced with each adoption. Not always easy to implement (latency). Can’t force adoption. Marketing, phone calls, education were the only tools.
  17. 9:59am ET - 2 Attacks! Size 30 + 20 GBits

    Target Gamma Client
 + Upstream’s Router Duration 76 min Signature Distributed UDP-Based Mostly port 0 + some 53 (DNS)
  18. Russian Federation - 51.2% Ukraine - 14.4% Czechia - 6.9%

    Poland - 6.2% Romania - 5.0% Moldova, Republic of - 2.8% January 20, 2016
  19. Shields Up! Asked Tier 1 to block all UDP/0 cluster-wide.

    Took a lot longer to mitigate (76 min) - more affected systems. Worked with Gamma Client to implement CloudFlare.
  20. udp User Datagram Protocol Block all UDP Most web-based applications

    use TCP (HTTP). Essential services like DNS (53) and NTP (123) use UDP. Made the call to block all UDP, with the exception of NTP and some DNS. Permanent block.
  21. 5:14pm ET Attack! Size 8 GBits Target Alpha Client Duration

    4 min Signature Distributed UDP-Based Mostly port 0 + some random
  22. Brazil - 19.7% Ukraine - 8.2% Argentina - 4.9% Thailand

    - 4.9% Iran, Islamic Republic of - 3.3% China - 3.3% January 26, 2016
  23. Russian Federation - 51.2% Ukraine - 14.4% Czechia - 6.9%

    Poland - 6.2% Romania - 5.0% Moldova, Republic of - 2.8% January 20, 2016 (previous)
  24. Shields Up? Why did we go down? UDP should be

    blocked. 8 Gbits is smallest so far.
  25. Tier 2 Went Down Upstream’s upstream (Tier 2) went down.

    Doesn’t make sense. Should be able to withstand 8 Gbits
 (survived 30 Gbits).
  26. Border Gateway Protocol (BGP) A name is who you want

    (DNS). An address is where it is (IP Address). A route is how to get there (BGP).
  27. BGP is like GPS for packets Like Google Maps or

    Waze. Routes are dynamic. Key difference: Routes are based on cost, not efficiency.
  28. BGP

  29. Brazil - 19.7% Argentina - 4.9%
 Chile - 3.3% Ecuador

    - 1.6% Colombia - 1.6% January 26, 2016 South America
  30. South American Routes Due to cost (agreements), traffic from South

    American countries came inbound from a different link (preferred route). Link was only 10 Gbits (attack was 8 Gbits). Still vulnerable!
  31. Not-so-secret Secret? Origin IP leaked. Any number of ways to

    discover proxied IP: Stale/leaked DNS records. Many services keep track of historical DNS entries. Same attacker (same signature), old IP may be recorded.
  32. Rotate IP Rotate out proxied/origin IP in secret. Original IP

    is tainted. Permanently null-route IP.
  33. Quite Frustrated 4 attacks in 3 months, 2 within a

    week. We were more vulnerable than we thought. CloudFlare works, but requires herd immunity. Blocking is even not enough. Sources matter. Need to “nuke it from orbit.”
  34. DDoS Scrubbing Services Companies specialize in this field. Own scrubbers

    and big pipes, and have trained staff. Downside: Still expensive. Not in our DC.
  35. Cat Herding 4 parties involved: Us, Tier 1, Tier 2,

    and Scrubbing Service. Take months to implement. Best Hope. "Only way to be sure.”
  36. We are Armada Collective. Most importantly, we have launched largest

    DDoS in Swiss history and one of the largest DDoS attacks ever. Search for "ProtonMail DDoS" All your servers will be DDoS-ed starting Monday (April 25) if you don't pay protection fee - exactly 11.41 Bitcoins (CAD $6,193) @ 17RBypDd7p62Jum8uN51rKUJfMWez98yeh If you don't pay by Monday, attack will start, yours service going down permanently price to stop will increase to 20 BTC and will go up 10 BTC for every day of attack. This is not a joke. Our attacks are extremely powerful - peak over 1 Tbps. Do not reply, we will not read. Pay and we will know its you. AND YOU WILL NEVER AGAIN HEAR FROM US!
  37. What do you do? Gave us 7 days. Do you

    take this seriously? Do you pay them? Scrubbing Service was nearly online, but still not ready. Contacted all parties and began seeking fast solutions. Clock was ticking.
  38. 9:31am ET Attack! Size 15 GBits Target Delta Client Duration

    25 min Signature Distributed UDP-Based Started port 0 + changed to NTP
  39. China - 32.2% Singapore - 7.8% Brazil - 6.7% Colombia

    - 6.7% Iran, Islamic Republic of - 6.7% India - 6.7% April 22, 2016
  40. We are a team of highly skilled individual security professionals

    who are trying to make the internet a safer place. We stumbled on your site and started digging. Our data base expert was able to dump your entire customer database in a matter of minutes. The data has not been released yet. We will tell you the vulnerabilities you have to patch and release your site once you pay our consultation fee of $300 USD. You can send BTC to the following address : 1KRQ6LVBFDGn26cdn6FF5hBckNPsPPJLax After payment is received we will not only stop all attacks but will tell you how to stop them in the future and add you to a blacklist so other groups leave you alone. Contacting your hosting provider will not stop the attack. The authorities cant stop the attack. IT companies will waste a ton of your money and still not be able to mitigate. We have the resources of some nation states. Lets not waste time, you have money to make!
  41. Shields Up! Attacker adapted within 2 minutes. Targeted the only

    UDP protocol still open: NTP. Permanently null-route IP to protect network. Worked with Gamma Client to implement CloudFlare and rotated IP.
  42. No attack transpired. Huge relief. Was it a bluff? Did

    they detect the route change? Was it a copy-cat?
  43. Scrubbing For All Decided to implement scrubber service cluster-wide. Hard

    financial decision. DDoS attacks were extremely harmful. Saw no other choice.
  44. Is this for real? Called FBI Headquarters, asked to be

    routed to Agent Michael. Agent Michael was legit.
  45. Investigation June 2016 period. Series of attacks targeting San Diego-based

    software company. Have a suspect. He’s American!
  46. Investigation Attacks were distributed and UDP-based. Mostly port 0, but

    can vary. Our IPs showed up on some seized systems.
  47. Sounds Familiar? Same signature! Agent Michael was interested in everything

    we had. With permission, sent everything over, including ransom notes.
  48. –FBI Press Release - Friday March 3, 2017 “Florida Man

    Arrested for Forcing a
 San Diego Company’s Website Off-Line”
  49. Gerald “Jerry” M. McTear III Age 29 From Ft. Myers,

    Florida. Arrested on charges of fraud and various computer crimes. Facing maximum 17 yrs in prison, USD $750k in fines.