{"id":26489,"date":"2016-10-28T09:17:47","date_gmt":"2016-10-28T09:17:47","guid":{"rendered":"https:\/\/udsenterprise.com\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/"},"modified":"2023-09-21T12:48:52","modified_gmt":"2023-09-21T12:48:52","slug":"zero-day-vulnerability-ldap-amplifies-ddos-attacks","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/","title":{"rendered":"Zero-day vulnerability in LDAP amplifies DDoS attacks"},"content":{"rendered":"<p>Apart from LDAP, attackers use other protocols to increase the scope of their <strong>DDoS<\/strong> offensives. Last year the most used were <strong>NetBIOS<\/strong>, <strong>RPC<\/strong>, <strong>Sentinel<\/strong>, <strong>DNSSEC<\/strong> and <strong>TFTP<\/strong>.<\/p>\n<p>Source: <a href=\"http:\/\/www.redeszone.net\/2016\/10\/27\/protocolo-ldap-aumenta-50-veces-la-potencia-los-ataques-ddos\/\" target=\"_blank\" rel=\"noopener nofollow\">Redes Zone<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Corero Network Security identified a zero-day <strong>vulnerability<\/strong> in <strong>LDAP protocol<\/strong> that enables to amplify <strong>Distributed Denial of Service attacks<\/strong> (DDoS) 50 times,  making them much more effective and much more difficult to mitigate.<\/p>\n<p>This protocol, mainly used in <strong>Windows Server Active Directory<\/strong> administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.  <\/p>\n","protected":false},"author":2,"featured_media":12810,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[985,926],"tags":[986,928],"class_list":["post-26489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hot-news","category-security","tag-hot-news","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero-day vulnerability in LDAP amplifies DDoS attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-day vulnerability in LDAP amplifies DDoS attacks\" \/>\n<meta property=\"og:description\" content=\"Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much more difficult to mitigate.This protocol, mainly used in Windows Server Active Directory administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-28T09:17:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T12:48:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"Zero-day vulnerability in LDAP amplifies DDoS attacks\",\"datePublished\":\"2016-10-28T09:17:47+00:00\",\"dateModified\":\"2023-09-21T12:48:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/\"},\"wordCount\":37,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg\",\"keywords\":[\"Hot news\",\"Security\"],\"articleSection\":[\"Hot news\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/\",\"url\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/\",\"name\":\"Zero-day vulnerability in LDAP amplifies DDoS attacks\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg\",\"datePublished\":\"2016-10-28T09:17:47+00:00\",\"dateModified\":\"2023-09-21T12:48:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg\",\"width\":840,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/udsenterprise.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hot news\",\"item\":\"https:\/\/udsenterprise.com\/en\/category\/hot-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero-day vulnerability in LDAP amplifies DDoS attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/udsenterprise.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VirtualCable_\",\"https:\/\/es.linkedin.com\/company\/virtualcable\",\"https:\/\/www.youtube.com\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero-day vulnerability in LDAP amplifies DDoS attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Zero-day vulnerability in LDAP amplifies DDoS attacks","og_description":"Corero Network Security identified a zero-day vulnerability in LDAP protocol that enables to amplify Distributed Denial of Service attacks (DDoS) 50 times, making them much more effective and much more difficult to mitigate.This protocol, mainly used in Windows Server Active Directory administration tool has become an ally for cybercriminals, that leverage vulnerable servers supporting LDAP to bounce junk traffic to a server with a single IP address, so the service is overcrowded and stops working.","og_site_name":"UDS Enterprise","article_published_time":"2016-10-28T09:17:47+00:00","article_modified_time":"2023-09-21T12:48:52+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"Zero-day vulnerability in LDAP amplifies DDoS attacks","datePublished":"2016-10-28T09:17:47+00:00","dateModified":"2023-09-21T12:48:52+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/"},"wordCount":37,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg","keywords":["Hot news","Security"],"articleSection":["Hot news","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/","url":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/","name":"Zero-day vulnerability in LDAP amplifies DDoS attacks","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg","datePublished":"2016-10-28T09:17:47+00:00","dateModified":"2023-09-21T12:48:52+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/ldap-protocol-ddos-attacks.jpg","width":840,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/zero-day-vulnerability-ldap-amplifies-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hot news","item":"https:\/\/udsenterprise.com\/en\/category\/hot-news\/"},{"@type":"ListItem","position":3,"name":"Zero-day vulnerability in LDAP amplifies DDoS attacks"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=26489"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26489\/revisions"}],"predecessor-version":[{"id":28721,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26489\/revisions\/28721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/12810"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=26489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=26489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=26489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}