In October 2016, a botnet of hacked security cameras and internet routers called Mirai aimed a gargantuan flood of junk traffic at the servers of Dyn, one of the companies that provides the global directory for the web known as the Domain Name System or DNS. The attack took down Amazon, Reddit, Spotify, and Slack temporarily for users along the East Coast of the US. Now one group of researchers says that a vulnerability in DNS could allow a similar scale of attack, but requiring far fewer hacked computers. For months, the companies responsible for the internet’s phone book have been rushing to fix it.
Today researchers from Tel Aviv University and the Interdisciplinary Center of Herzliya in Israel released new details of a technique they say could allow a relatively small number of computers to carry out distributed denial of service attacks on a massive scale, overwhelming targets with fraudulent requests for information until they’re knocked offline. The DDoS technique, which the researchers called NXNSAttack, takes advantage of vulnerabilities in common DNS software. DNS converts the domain names you click or type into the address bar of your browser into IP addresses. But the NXNSAttack can cause an unwitting DNS server to perform hundreds of thousands of requests every time a hacker’s machine sends just one.
That multiplicative effect means that an attacker could use just a handful of hacked machines, or even their own devices, to carry out powerful DDoS attacks on DNS servers, potentially causing Mirai-scale disruption. “Mirai had like 100,000 IoT devices, and here I think you can have the same impact with only a few hundred devices,” says Lior Shafir, one of the Tel Aviv University researchers. “It’s a very serious amplification,” Shafir adds. “You could use this to knock down critical parts of the internet.”
Or at least, you could have a few months ago. Since February, the researchers have alerted a broad collection of companies responsible for the internet’s infrastructure to their findings. The researchers say those firms, including Google, Microsoft, Cloudflare, Amazon, Dyn (now owned by Oracle), Verisign, and Quad9 have all updated their software to address the problem, as have several makers of the DNS software those companies use.
While DNS amplification attacks aren’t new, NXNSAttack represents a particularly explosive one. In some cases, the