It has been reported that threat actors are actively exploiting
In late February, researchers discovered the use of
Due to the availability of open
What you should do about it
- Review and apply Memcache version 1.5.6 if applicable. This release disables UDP by default .
- Review internal denial of service strategies. Have a plan in place in the event of a denial of service attack.
- Discuss denial of service strategies with service providers. Understand their capacity to withstand attacks, responsive actions, and associated costs.
In the event of an attack, eSentire recommends:
- Traffic diversion to a dedicated DDoS Mitigation service using BGP or DNS based routing.
- In-line filtering, using a hardware appliance such as Web Application Firewalls (WAFs). This will provide protection against application-layer attacks.
- Identifying and disabling the attack vector(s). This may involve disabling vulnerable services or removing large files from online services.
Memcached is a high-performance, distributed memory object caching system  used to speed up dynamic database-driven websites. Memcached-based DDoS attacks are possible thanks to the use of the UDP protocol for connection requests (UDP has been disabled as of memcached version 1.5.6), allowing attackers to reflect UDP packets off a memcached server.
A potential attack scenario may involve the following:
- Attackers prime one or more memcached servers with arbitrary data.
- Attackers send a series of requests for the data over UDP port 11211.
- These requests contain a source IP set to the DDOS target. The source port can also be spoofed to target a specific service.
- The memcached servers receive the requests and send large responses to the target. The response is much greater than the request (i.e. amplified).
- Depending on the size of the attack, the target’s resources are eventually depleted, resulting in outages and a denial of service.
At the time of writing 89,000 exploitable Memcached servers are publicly discoverable via open source tools.