CNS Corero Network Security

Corero Warns of Powerful New DDoS Attack Vector with Potential for Terabit-Scale DDoS Events

Corero Network Security (LSE: CNS), a leading provider of First Line of Defense® security solutions against DDoS attacks, has today disclosed a significant new zero-day DDoS attack vector observed for the first time against its customers last week. The new technique is an amplification attack, which utilizes the Lightweight Directory Access Protocol (LDAP): one of the most widely used protocols for accessing username and password information in databases like Active Directory, which is integrated in most online servers.

While Corero’s team of DDoS mitigation experts has so far only observed a handful of short but extremely powerful attacks against their protected customers originating from this vector; the technique has potential to inflict significant damage by leveraging an amplification factor seen at a peak of as much as 55x. Therefore, in terms of its potential scale, if combined with the Internet of Things botnet that was utilized in the recent 655 Gigabyte attack against Brian Krebs’s website, we could soon see new records broken in the DDoS attack landscape, with potential to reach tens of Terabits per second in size in the not too distant future. The DDoS landscape has been extremely volatile in recent weeks, particularly with the release of the Mirai code and subsequent Mirai infected Internet of Things (IoT) devices, and we expect this trend to continue for the foreseeable future.

Dave Larson, CTO/COO at Corero Network Security, explains: “This new vector may represent a substantial escalation in the already dangerous DDoS landscape, with potential for events that will make recent attacks that have been making headlines seem small by comparison. When combined with other methods, particularly IoT botnets, we could soon see attacks reaching previously unimaginable scale, with far-reaching impact. Terabit scale attacks could soon become a common reality and could significantly impact the availability of the Internet– at least degrading it in certain regions.”

Reflection and amplification attacks

In this case, the attacker sends a simple query to a vulnerable reflector supporting the Connectionless LDAP service (CLDAP) and using address spoofing makes it appear to originate from the intended victim. The CLDAP service responds to the spoofed address, sending unwanted network traffic to the attacker’s intended target.

Amplification techniques allow bad actors to intensify the size of their attacks, because the responses generated by the LDAP servers are much larger than the attacker’s queries. In this case, the LDAP service responses are capable of reaching very high bandwidth and we have seen an average amplification factor of 46x and a peak of 55x.

Dave Larson explains: “LDAP is not the first, and will not be the last, protocol or service to be exploited in this fashion. Novel amplification attacks like this occur because there are so many open services on the Internet that will respond to spoofed record queries. However, a lot of these attacks could be eased by proper service provider hygiene, by correctly identifying spoofed IP addresses before these requests are admitted to the network. Specifically, following the best common practice, BCP 38, described in the Internet Engineering Task Force (IETF) RFC 2827, which describes router configurations that are designed to eliminate spoofed IP address usage by employing meaningful ingress filtering techniques, would reduce the overall problem of reflected DDoS by at least an order of magnitude.

“Today’s DDoS attacks are increasingly automated, meaning that attackers can switch vectors faster than any human can respond. The only effective defense against this type of DDoS attack vector requires automated mitigation techniques. Relying on out-of-band scrubbing DDoS protection to stop these attacks will cause significant collateral damage. Given the short duration and high volume attacks, legacy solutions simply cannot identify and properly mitigate in time to protect network availability.

The CLDAP zero-day attacks targeted at Corero customers were automatically mitigated by the Corero SmartWall® Threat Defense System with patented Smart Rule functionality. No human intervention was necessary in mitigating this previously unknown DDoS attack vector and no outages were caused as a result of these attacks in the Corero customer base.

About Corero Network Security

Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and online enterprises rely on Corero’s award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This next-generation technology provides a First Line of Defense® against DDoS attacks in the most complex environments while enabling a more cost effective economic model than previously available. For more information, visit www.corero.com.

EN
25/10/2016

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Corero Network Security

Hybridan Team ... (+2)
  • Hybridan Team
  • Jon Levinson

Hybridan Small Cap Feast: 05 November 2025

* A corporate client of Hybridan LLP. ** Potential means Intention to Float (ITF) or similar announcement has been made. ***Arranged by type of listing and date of announcement. ****Alphabetically arranged and priced on Share Price and Market Capitalisation during the time of writing on the day of Publication. Dish of the Day Admissions: Princes Group (PRN.L) a leading international platform in the UK and European food and beverage sector, announced the commencement of unconditional deal...

Hybridan Team
  • Hybridan Team

Hybridan Small Cap Feast: 16/09/2025

Our daily digest of news from UK Small Caps 16th September 2025 @HybridanLLP * A corporate client of Hybridan LLP. ** Potential means Intention to Float (ITF) or similar announcement has been made. ***Arranged by type of listing and date of announcement. ****Alphabetically arranged and priced on Share Price and Market Capitalisation during the time of writing on the day of Publication. Dish of the day Admissions: None Delistings: N...

Bob Liao ... (+2)
  • Bob Liao
  • Carl Smith

Corero Network Security (CNS LN) - Interim results - Corporate

Corero’s H1 results were well flagged during the July trading update (see research) and showcase the transition towards a higher quality revenue stream with ARR +25% yoy to $21.6m. The lengthening of sales cycles and delays to customers decisions in light of macro uncertainty has, however, weighed on the Group’s upfront license deals in H1, contributing to an 11% fall in Group revenue yoy. The shift in customer behaviour from capex deals towards opex deals is positive, in our view, and should im...

Hybridan Team
  • Hybridan Team

Hybridan Small Cap Feast: 16/07/2025

* A corporate client of Hybridan LLP. ** Potential means Intention to Float (ITF) or similar announcement has been made. ***Arranged by type of listing and date of announcement. ****Alphabetically arranged and Closing Price on prior day to Publication. Dish of the day Admissions: None Delistings: None What’s baking in the oven? Potential** Initial Public Offerings:*** Updated 10th June: iFOREX Financial Trading, the fintech business with a proprietary online and mobile...

Bob Liao ... (+2)
  • Bob Liao
  • Charlie Williams

Corero Network Security (CNS LN) - H1 update: Delayed growth - Corpora...

In H1, Corero saw a further shift in revenue mix toward subscription rather than upfront sales and experienced weak Q1 order intake due to weaker macroeconomic conditions. As a result, the company now expects revenue to be approximately flat in FY25 and for EBITDA to be negative compared to a $2.5m profit in FY24. For FY26, we forecast a return to revenue growth (+13%), a return to EBITDA profit of $1.0m. We remain positive on the DDoS and cybersecurity markets over the long-term but see the shi...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch