• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Whitepapers
  • Data Strategy Spotlight
  • Newsletters
  • Whitepapers
    • Inqlogo 120x194
      Five things you should look for in choosing a Testing provider

      Choosing a Testing Partner can be complex.  So what do you look for?  This guide offers insight into the qualities you must look for in choosing a Testing provider.  Download now to learn more.

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • Data Strategy Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Trending
  • MWC 2019
  • Article 13
  • AMD Radeon VII
  • Galaxy S10
  • Nvidia GTX 1660 Ti 
The Inquirer
  • Security

BitTorrent: Theoretical boosted DoS attack threat has been mitigated

So, that's that then

Digital security padlock red image
BitTorrent doubts that it could be exploited by bad eggs with service denial on their minds
  • Dave Neal
  • Dave Neal
  • @daveneal33
  • 18 August 2015
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

BITTORRENT HAS TOLD The INQUIRER that we can all chill on panic talk about lone hackers and souped-up denial-of-service (DoS) attacks, informing us that the published problems have been taken care of. 

We are here because security research, the scourge of Oracle the malware industry, found that BitTorrent could be exploited by lone warriors and used to bring down sites through DoS attacks.

It would usually take a whole gang of computers to lob a DoS attacks at an organisation, but it is now apparently possible to do some of the grunt work through one computer, in one bedroom, and through BitTorrent's services.

A scientific paper, called P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks, was released by City University London researcher Florian Adamsky and cloud security firm Plumgrid at last week's iWoot security show.

The research found that torrent-associated protocols can be used to boost a DoS attack, if not completely effect one.

"In this paper, we demonstrate that the BitTorrent protocol family is vulnerable to distributed reflective DoS attacks. Specifically, we show that an attacker can exploit BitTorrent protocols Micro Transport Protocol, Distributed Hash Table, Message Stream Encryption and BitTorrent Sync to reflect and amplify traffic from peers," they wrote.

"Our experiments reveal that an attacker is able to exploit BitTorrent peers to amplify the traffic up to a factor of 50 times and in case of BTSync up to 120 times. Additionally, we observe that the most popular BitTorrent clients are the most vulnerable."

Adamsky, speaking to the TorrentFreak website, suggested that the attack is relatively easy to carry out.

"This attack should not be so hard to run, since an attacker can collect millions of possible amplifiers by using trackers, Distributed Hash Table or peer exchange," he said. "With a single BTSync ping message, an attacker can amplify the traffic up to 120 times."

Whoa, there. BitTorrent is here with its reaction, saying that Adamsky came to the firm a few weeks before going public, and it has already taken much of this in hand.

BitTorrent told The INQUIRER that this attack is theoretical, and has not been seen in the wild. Rather, it was carried out in a controlled environment. The firm added that such attacks are possible because of the nature of the systems at hand, but explained that it is aware of this and works against the weaknesses.

"Attacks like this will always be possible due to the way that User Datagram Protocol-based protocols work. Abuse of DNS is commonly known. And even as recent as February 2014, public Network Time Protocol servers across the world were leveraged to carry out such an attack," BitTorrent said, explaining that it has already carried out some remedial work.

"Nonetheless, we've taken the vulnerability reports seriously and have taken steps to harden our protocols and mitigate some weaknesses outlined in the research paper. The team at BitTorrent has already been able to address much of the issue prior to the paper's publication and will soon have mitigated the matter completely."

BitTorrent added that Sync already had much of the preventative measures required to see off this threat, explaining that the hacker would need to know their target or get them to expose themselves publicly.

The firm will share more information about its findings and feelings in a blog post later. µ

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Security
  • Security

INQ Latest

CERN has made the original 1990s web browser available to play with
CERN has made the original 1990s web browser available to play with

It does not run Google Docs well

  • History
  • 21 February 2019
Nvidia might launch entry-level GeForce GTX 1650 Turing GPU next month
Nvidia might launch Turing-based GeForce GTX 1650 next month

Expect the graphics card to be an entry-level offering

  • Graphics
  • 21 February 2019
OnePlus 7 live image confirms notch-less, bezel-free design
OnePlus 7 live image confirms notch-less, bezel-free design

Firm could opt for a slider mechanism instead

  • Phones
  • 21 February 2019
Microsoft launches Office app for Windows 10
Microsoft launches new Office app for Windows 10

Supofficeial

  • Software
  • 21 February 2019
Back to Top

Most read

Galaxy S10 price, release date and specs: S10, S10+ and S10e pre-orders begin
Galaxy S10 price, release date and specs: S10, S10+ and S10e pre-orders begin
iPhone 11 release date, specs and price: 2019 iPhones might offer reverse wireless charging
iPhone 11 release date, specs and price: 2019 iPhones might offer reverse wireless charging
Galaxy S10 lineup official barely any surprises in store
Galaxy S10 lineup official with barely any surprises in store
Password managers are storing plain-text master passwords in PC memory
Password managers are storing plain-text master passwords in PC memory
Samsung's first 5G smartphone is a supersized S10 with quad cameras
Samsung's first 5G smartphone is a supersized S10 with quad cameras
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017