Last October 21, online intruders have paralyzed the entire web from mid-western to the eastern parts of the United States. This denial of service approach involves a swarming of information packets that run at one terabyte per second.
Cyber attacks continue to innovate as another case of online infiltration has surfaced. This time, though, multiple damages are done through a single computer.
Hackers have revolutionized their approach as cyber hits are being narrowed down to a lone electronic control unit. The process is definitely a major upgrade from past experiences wherein breaches are done through a number of devices from various locations.
The days of massive online attacks may be on the wane as researchers from the TDC Security Operations Center discovered a new mode of attack along the internet superhighway.
It has been divulged that BlackNurse can topple big servers with just one central processing device that runs on at least 15Mbps of bandwidth. The equation involves the overwhelming of an entire system leading to a disastrous meltdown of servers involved. The idea here is not anymore about bombarding a target with heavy traffic.
Distinct bundles of Internet Control Message Protocol (ICMP) will be freed on protected networks. The mode of action is to pressure the firewalls. With so much information intruding, the servers will be decommissioned within a period of time.
Over the last two years, around 95 known attacks have been noted. The security group Netresec has pointed out that prime targets are firewalled servers from Zyxel, Palo Alto Networks, SonicWall and Cisco Systems.
Despite the relentless attack of BlackNurse, there is a way to repel the intrusions. To counter data flooding, TDC suggests that filters be instituted. It must be noted that this problem is primarily a concern for firewall manufacturers that provide entry of external ICMP packets. Network companies are able to protect servers through default settings which mean that unless users will alter the recommended framework, the walls remain secured.
However, applied applications by some companies can make the firewalls vulnerable. Such organizations cannot be blamed considering that the instituted adjustments are made according to their systems requirements.
Within this context, it is perceived that changing the message protocol may be all that is needed by one hacker to gain entry into a domain.