[172042] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Large DDoS, small extortion

daemon@ATHENA.MIT.EDU (Jared Mauch)
Thu May 22 10:03:51 2014

X-Original-To: nanog@nanog.org
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <CAN-S6ZqtwxcjGudh8Q+bW5u=7WEvz5Jn4Tdk-MmQ1u-9QHXhig@mail.gmail.com>
Date: Thu, 22 May 2014 10:03:56 -0400
To: Beleaguered Admin <dealing.with.ddos@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org


On May 22, 2014, at 12:51 AM, Beleaguered Admin =
<dealing.with.ddos@gmail.com> wrote:

> Apologies for the non-personal email address, but I don't want to give
> our attacker any additional information than I need to.
>=20
> I'd be happy to send personal contact/ASN information to any nanog
> admins or regular members of nanog if it's useful.
>=20
> We've tried to engage upstream providers to help trace the attacks,
> but have gotten nowhere (they didn't seem to understand that the syn
> attacks were spoofed, and looking at source IPs didn't matter, we
> wanted to know the ingress points on their network.)

this sounds like a tooling issue on their part.  they should be able to =
pick a specific set of items and trace them back and mitigate some set =
of spoofed packets.  Some attackers are advanced and will detect when =
you block their spoofed packets immediately (they have telemetry/data =
like we all do) and move to another attack vector.

> What are the best practices for this?  Are there secret code words
> (http://xkcd.com/806/) we can use to get to someone at our upstreams
> who might know what we're talking about?  Is it worth the time?

You need to talk to the security team in their NOC.  These are usually =
small and sometimes difficult to reach.  I know our NOC can find them =
quickly and works with them on customer issues often.

> Is it worth talking to law enforcement? =20

Absolutely.  Even if the "lost costs" have been just payroll which =
already exist, this may be related to other activity.  I suggest calling =
your local FBI office (assuming you are in the US).  They can be quite =
helpful.  If you don't get somewhere quickly, let me know and I can try =
to hunt someone in a local field office for you.

> Some of these have been >500k
> costs to the customer, but we assume the person doing it isn't in any
> western country, so maybe it doesn't even matter?

I'll say it does matter, because even if they are in some "unreachable" =
location, these folks sometimes travel to locations where they can be =
picked up.  It may not be immediate, but can help build the case.

It is sad, but I can likely guess who your upstreams are, and some are =
more responsive than others.  I'm aware of one that puts almost no =
effort into tracking spoofed packets to clamp down on them.

- Jared=

home help back first fref pref prev next nref lref last post