New DDOS attacks: from smart phone browsers

Source: Internet
Author: User

New DDOS attacks: from smart phone browsers

 

Security experts recently discovered that smartphone browsers can also generate flood attacks with massive traffic.

Detected DDOS attacks from mobile browsers

According to a security expert analysis, a mobile advertising network can direct thousands of mobile browsers to a website at the same time, causing the website server to crash, thus achieving the purpose of distributed denial-of-service attacks.

According to CloudFlare, a ddos Protection Service Provider found that a customer's website received 4.5 billion page requests within several hours, the source IP address and object of the page request are parsed and found to be from a mobile browser with a Chinese IP address.

According to Marek majkoski of CloudFlare,

Browser flood attacks are Layer 7 Based on the tcp osi Layer 7 protocol. This attack method was proposed as a theory several years ago, but it is difficult to use distributed methods efficiently, so that a large number of browsers send requests to the target URL at the same time, resulting in DDOS effect, so it has never appeared in the actual environment.

This time, by analyzing the monitoring log majkoski, we found that the attack type reached 0.27 million requests per second during the peak period, and 80% of the devices initiated were from mobile phones. From the log, we also found that the mobile browser versions that initiate the request include Safari, Chrome, Xiaomi browser, and QQ browser.

How are these attacks formed?

First, the organizer of the attack intercepts the content of the searched or hosted webpage and injects malicious JavaScript code. For example, the organizer analyzes JavaScript code and HTML resources by hosting the webpage on baidu.com, replace it with the JavaScript code that contains attack fragments (initiate a request to the target website). Then, when the user opens a browser app or browses the webpage to access these pages, requests will be sent continuously to the attacked domain name.

The following is the injection Code initiated by a request. After modification, You can initiate a request to the target website,

function imgflood() {var TARGET = 'victim-website.com'var URI = '/index.php?'var pic = new Image()var rand = Math.floor(Math.random() * 1000)pic.src = 'http://'+TARGET+URI+rand+'=val'}setInterval(imgflood, 10)

The script generates an image button on the target page that points to the victim-website.com website. As long as the user accesses a Web page containing the script, it will become a member of the "victim-website.com" DDoS attack. Every request sent by the browser is a valid request, so the attack becomes a Layer 7 attack.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.