Catchpoint Platform
Complete, actionable insights and visibility into your entire digital user experience.
Capabilities
On October 21, 2016, hundreds of major media and application service providers experienced outages, including some of the biggest in the world: Amazon, GitHub, PlayStation Network, Twitter, and PayPal. These services continued to have issues throughout the day, resulting in millions of dollars in lost revenue.
The common element among them was DYN, a DNS provider for all of these companies’ domains; its DNS servers had been targeted by what would later be identified as a DNS flood attack. This was one of the first major events that would expose glaring vulnerabilities in one of the services at the very heart of the Internet: the Domain Name System.
DNS floods are distributed denial of service (DDoS) attacks targeting DNS servers. In this article, we will explore how a DNS flood works, the types of DNS flood attacks that exist, the effects of a DNS flood, how a hypothetical attack is carried out, and best practices for preventing DNS flood attacks.
{{banner-26="/design/banners"}}
Here is a quick rundown of some of the key points covered in this article.
To understand how DNS floods work, it is important to first discuss the origins of the denial of service (DoS) attack and the distributed DoS (DDoS) variant.
A denial of service attack is one where a single point of origin—one IP address—targets a resource, attempting to take it down by flooding it with requests and thus preventing the server from being able to respond to legitimate queries. A distributed denial of service attack has multiple points of origin (with multiple IP addresses) that work in concert to attack a resource; typically, these are devices created or controlled through malicious methods. These attacks use various types of requests and protocols to overwhelm the resources of other devices; ICMP and UDP packets are popular for these attacks through IP address spoofing.
DNS is the protocol responsible for translating domain names into IP addresses, which allows users to access websites and other resources on the Internet. A DNS flood attack is essentially a DDoS attack targeting the DNS infrastructure using DNS query and response traffic.
In a DNS flood attack, the attacker overwhelms DNS servers with a large volume of DNS queries or responses, causing them to slow down or crash. This can lead to website downtime, slow Internet speeds, and other disruptions. DNS flood attacks can be launched from networks of compromised devices, such as botnets, making them difficult to trace and stop.
{{banner-23="/design/banners"}}
There are several types of DNS flood attacks. Each is named for the specific techniques used to carry out the attack and has a unique element in how it functions.
An amplification/reflection attack begins with an attacker spoofing the IP address of the client to be the IP address of the victim (reflection), which results in all of the DNS replies being sent directly to the victim (amplification). The initial requests are very small and ask for the DNS servers to return the entire list of available DNS records for a particular domain, including subdomains. The resulting answer is substantially larger than the request: 100 times larger, in some cases.
If a threat actor has compromised only a few machines, all of which are spoofing their IPs and sending responses to the victim, the resulting traffic would be substantial enough to tie up the victim’s resources for servicing requests, which could no longer be processed.
This attack is significantly more effective if several DNS resolvers are targeted and have configurations that allow any source IP address.
A real-world example of a DNS amplification attack occurred in March 2013, when the anti-spam organization Spamhaus was targeted by what was described as the largest DDoS attack in history at the time. The attack, which peaked at 300 gigabits per second, caused widespread disruption to Internet services and lasted for several days.
The attackers sent small DNS queries to vulnerable servers, which then responded with large DNS responses. The attackers spoofed the source IP addresses of the queries, making it appear as if the requests came from Spamhaus’s servers. The large volume of traffic generated by the DNS responses overwhelmed these servers, causing them to crash and making it difficult for legitimate traffic to reach the site. The attack was eventually mitigated by redirecting traffic through cloud-based DDoS protection services.
The Spamhaus attack demonstrated the potential of DNS amplification attacks to cause significant disruption to Internet capabilities.
{{banner-24="/design/banners"}}
This type of attack involves sending a large volume of DNS queries for valid domain names but with randomized subdomains. These requests cause the DNS server to repeatedly search for nonexistent subdomains. The nonexistent domain replies (NXDOMAIN) will cause cache overflow errors, and the server will no longer be able to process requests for legitimate domains.
The term “water torture” is used to describe this type of attack because it is analogous to the constant dripping of water on a victim’s forehead—in this case, the victim being the DNS server. This sort of attack is not sudden or explosive but rather a slow and methodical process that can, nonetheless, be just as damaging in the long run as a more sudden attack.
In the diagram below, an attacker is trying to target example.com and will cause a cache overflow to the authoritative name server and any resolvers used by the bots. Requests for numerous nonexistent subdomains of example.com (abc, def, and ghi) will move through the resolver and then the root, .com, and authoritative DNS servers. The authoritative name server will respond with NXDOMAIN, and the resolver’s cache will start to overflow while the authoritative server is losing resources processing the requests and trying to return the NXDOMAIN responses.
A Radware Cybersecurity Advisory dated January 31, 2023, highlighted the emergence of a Russian botnet called Passion. Affiliated with groups like Killnet and Anonymous Russia, Passion offers “DDoS-as-a-service” to pro-Russian hacktivists. The botnet was recently used in attacks on medical institutions in multiple countries as retaliation for their support of Ukraine. The Passion group is known for defacement and denial-of-service attacks against individuals and organizations opposing the Russian invasion of Ukraine.
Radware warns that the Passion botnet was used in cyberattacks deployed on January 27, 2023, which targeted medical institutions in the US, Portugal, Spain, Germany, Poland, Finland, Norway, Netherlands, and the UK.
These attacks prompted the Health Sector Cyber Security Coordination (H3C) center to release several reports warning the healthcare industry against NXDOMAIN attacks and other floods. More information can be found in this H3C white paper and this sector alert specifically addressing the tactics used in the NXDOMAIN attacks.
A DNS flood can produce a wide range of significant negative impacts on both the targeted network and its users. These include both direct and indirect effects, such as the following:
To help you better understand how DNS flood attacks work, let’s discuss how, in theoretical terms, a DNS flood attack is created and executed.
Threat actors may choose a target for DNS attacks based on several factors, including the target’s industry, size, reputation, and vulnerabilities. Understanding the common considerations that threat actors take into account when choosing a target for DNS attacks can help you better assess your organization’s risk level:
For simplicity, this section will focus on an amplification attack executed against an imaginary DNS provider. Our attacker will need to secure additional computing resources to carry out the attack by sending requests, which could be accomplished by following these steps:
The attacker will now start generating DNS requests for a specific domain (to respond with the full list of records) from each device. The dig command (a Linux-based domain lookup command) is an example of how this could be accomplished: Each dig command issued on a device will create the required queries. Each machine must appear to be sending the requests from the victim’s IP, which is accomplished by spoofing the source IP in the header to be the IP for the victim.
If all goes according to plan, the attack should successfully consume most of the resources of the victim responsible for resolving DNS requests. Sites hosted with the provider will begin to return 501 errors.
Again, this is all very basic and hypothetical. Another option is simply purchasing a “premade” attack from a blacklisted website. Of course, this is unethical and should not be attempted by anyone, but the attacks do exist in this form, so organizations need to recognize this as a possible concern.
{{banner-25="/design/banners"}}
Preventing DNS flood attacks requires a multi-layered approach that involves a combination of network infrastructure and application-level security measures. Some of the best practices for preventing DNS flood attacks include the following:
In addition to following these best practices, organizations should also have a comprehensive incident response plan in place to quickly detect and respond to DNS flood attacks. This plan should include procedures for notifying internal and external stakeholders as well as steps for mitigating the impact of the attack and restoring services as quickly as possible.
DNS floods are essentially DDoS attacks targeting DNS servers. In this article, we explained how these attacks work, described the different types of DNS floods, and discussed their potential effects. To help you appreciate just how simple it can be to acquire bots and target someone in this manner, we also provided context by looking at how an attack can be set up from the perspective of a potential attacker. This information should help you understand the potential severity and scalability of these dangers.
We also provided a list of best practices for preventing DNS flood attacks, including rate limiting, ACLs, caching, monitoring, distributed DNS, regular updates, and DNSSEC. By following best practices and maintaining a proactive approach to DNS security, you can reduce the risk of DNS flood attacks and protect your network and users from the impact of cybercrime.
The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.
The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!
A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.
Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.