The availability and accessibility of online gaming infrastructures and devices creates opportunities for malicious actors to launch DDoS attacks and steal login credentials. Denial of service attacks have a long tradition in the community, occur frequently and keep evolving.
“DDoS attacks fueled by rivalries, poor password security protocols and readily available DDoS tools are widespread and harm gaming and non-gaming targets alike,” said Stuart Scholly, president of Prolexic. “There are serious repercussions for every industry from denial of service attacks that feed off the explosive growth of online gaming infrastructures.”
A Prolexic customer in the financial industry was the target of a DrDoS attack that reached 5 Gbps and made use of misconfigured game servers as intermediary victims to reflect and amplify network traffic to the financial services target, in an effort to stop it with a DDoS attack.
As is common in DrDoS attacks, the malicious actors increased the power of their DDoS attack against the financial services firm with reflection and amplification techniques. Sending a small request to one gaming server produced an outsized response that was five times larger than the initial request. The attackers co-opted hundreds of gaming servers to produce the same outsized response at once, and repeatedly, against the targeted financial services firm.
“This attack targeted Call of Duty 2 gaming servers across the globe – in South Africa, Europe, Asia and the United States,” explained Scholly.
The laboratory-created proof-of-concept attack script will be available to the public on the official PLXsert GitHub page.