Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
It has been reported that threat actors are actively exploiting memcached servers to launch Distributed Denial of Service (DDoS) attacks at record-breaking sizes. Memcached-based DDoS is a new method of attack, using memcached servers to amplify the original attack strength by up to 51,200 times .
In late February, researchers discovered the use of memcached servers for DDoS attacks. On February 28, the popular code hosting website GitHub was targeted with a 1.35 Tbps attack causing a brief outage . On March 5, Arbor Networks reported that an undisclosed US website was targeted with the largest known DDoS attack to date, at 1.7 Tbps . Over this brief time period, attackers implemented DDoS for ransom tactics; including a ransom note inside of the bytes sent to the victim IP, offering to stop the attack. eSentire has observed an escalation in activity related to this vulnerability across our customer base.
Due to the availability of open memcached servers and the limited mitigation options, eSentire assesses with medium confidence that memcached-based DDoS attacks pose an immediate threat.
Memcached is a high-performance, distributed memory object caching system  used to speed up dynamic database-driven websites. Memcached-based DDoS attacks are possible thanks to the use of the UDP protocol for connection requests (UDP has been disabled as of memcached version 1.5.6), allowing attackers to reflect UDP packets off a memcached server.
A potential attack scenario may involve the following:
At the time of writing 89,000 exploitable Memcached servers are publicly discoverable via open source tools.