One of the largest data centers in South America – providing webhosting, servers, server bays, and networking infrastructure – was severely compromised by a major DDoS incident. The attack repeatedly took the data center completely offline several times over the course of a few days. All the business’s customers were affected by hours of downtime, which was a clear reputational hit.
The attackers managed to overcome the company’s cloud-based cybersecurity solutions, provided by two separate vendors, as well as their on-premises network and server protection technology. The BGP-based threat (L3 or L4) mitigation solutions were just insufficient, with one of them failing to accurately identify the attack and the second relying on a scrubbing center located far outside the region where the company is located. The distance resulted in latency issues that made it hard to implement effective mitigation, but contracting additional local vendors was not a cost-effective option either.
The company called Red Button to help them assess and fix the security gaps. We began by reviewing their architecture, determining that their protection level was below that required for their industry. So, we configured the data center’s cloud-based protection services and upgraded the on-prem protection technology accordingly. We also took a look at the DNS, though it was not targeted in the large-scale attack, and improved its resilience with targeted technology changes. For the company’s security teams, we drafted a DDoS playbook with written procedures for handling such attacks and planned DDoS war games for training.
With those changes in place, we designed and implemented a DDoS test that included Layer 3 and Layer 4 attacks (UDP, SYN, and ACK floods) challenging the data center’s cloud protection services. We also simulated Layer 7 attacks on the DNS (Reflective, Garbage, Query, Recursive) and HTTPS vectors, as part of our preemptive approach to cybersecurity.
The multifaceted DDoS test showed that our adjustments had a positive effect, with mitigation of the simulated flood attacks on the data center’s cloud-based services.
Our suspicion that the DNS was vulnerable was proven correct when we saw that DNS Query and DNS Recursive floods were not mitigated during testing. Neither were our simulated HTTPS attacks. However, it bears noting that DNS Reflective and DNS Garbage floods were in fact mitigated by the company’s DDoS protection technology.
We recommended the following measures to improve the company’s DDoS mitigation outcomes across the board:
Check out these resources for more information
about our DDoS testing solutons for your business.