Unfortunately, this kind of attack is being popular in the hacking community. Hence, the security researchers from the University of California at Berkeley and the University of Toronto have uncovered a powerful weapon of the Chinese Government cyber arsenal. The tool is dubbed as the “Great Canon”, that issued to hit websites with powerful DDoS attacks. The Great Cannon has been used by Chinese Authorities to knock out two anti-censorship GitHub pages. It can also be used as a hacking tool to silently install malware on the targeted machine.
Another similar DDoS attacks was uncovered few days ago, experts at Imagur discovered that a vulnerability in the platform was exploited by attackers to target the imageboards 4chan and 8 chan.
Hence, now it had been noticed by CloudFlare that a large number of HTTP requests aimed at one of its customer’s website, its attacked had peaked at over 1 billion requests per hour. The experts observed a total of 4.5 billion requests reaching the content delivery network’s servers on the day of the attack.
The overall number of unique IP addresses originating the requests is 650,000, 99.8 % of them being traced to china. But it was discovered by Experts that nearly 80% of the requests were originated from mobile devices, in many cases from mobile apps and browsers that are popular in China.
“Attacks like this form a new trend,” states a blogspot published by CloudFlare. “ they present a great danger in the Internet – defending against this type of flood is not easy for small website operators.”
CloudFlare researchers excluded that the DDoS attack was conducted by injecting TCP packets like observing in this attack that were conducted by Great Canon.
Few months ago, F5 Networks’ David Holmes explained a SecurityWeek column why mobile DDoS never materialized. One of the main reasons, according to the experts, is that mobile users mostly rely on dedicated apps to connect to various online services instead of using web browser as they do on desktop computers. This makes it less likely for a mobile device to be affected by a malvertising campaign.
Here, at this article providing some description for the attack scenario:-
- A user was casually browsing the Internet or opened an app on the Smartphone.
- The user was served an iframe with an advertisement.
- The advertisement content was requested from an ad network.
- The ad-network forwarded the request to the third-party that won the ad auction.
- Either the third-party website was the “attack page”, or it forwarded the user to an “attack page”.