Blog | G5 Cyber Security

Google Public DNS Server Spoofed for SNMP based DDoS Attack

SANS Internet Storm Center reports SNMP (Simple Network Management Protocol) amplification attacks. SNMP is a UDP-based protocol designed to allow the monitoring of network-attached devices by querying information about their configuration. The attack is likely part of an attempt to launch a DDoS against Google by using SNMP as an amplifier/reflector. The ISC is investigating the magnitude of SNMP attacks, and discovered few packets that were targeting default passwords used by SNMP. Attack uses the default “read-write” community string of “private” as a password.

Source: https://thehackernews.com/2014/09/google-public-dns-server-spoofed-for_16.html

Exit mobile version