BlackNurse DDoS Attacks Are Small But Mighty.

BlackNurse is a revolutionary technology in the field of cyber-attacks. Hackers only need one laptop and minimal data to perform a DoS (denial of service) attack.

The BlackNurse attacks target Cisco, SonicWall, Palo Alto and Zyxel firewalls. This method requires small resources to bring down large servers offline.

The Security Operations Center of Danish telecom operator TDC did research on the BlackNurse attacks and wrote a report, detailing their technological aspects and their severity. The researchers highlighted that the method uses low bandwidth Internet Control Message Protocol (ICMP). They explained that BlackNurse “is capable of doing a denial of service to well-known firewalls”. The unusual aspect is that a hacker needs a simple device and a small amount of data to initiate an attack.

The TDC experts shared their observations on the method: “The BlackNurse attack attracted our attention, because in our anti-DDoS solution we experienced that even though traffic speed and packets per second were very low, this attack could keep our customers’ operations down. This even applied to customers with large internet uplinks and large enterprise firewalls in place. We had expected that professional firewall equipment would be able to handle the attack.”

The BlackNurse technology utilises ICMP Type 3 Code 3 “port unreachable” messages to attack a server. The goal of these messages is to overload the firewall’s CPU. As the research team wrote: “Based on our test, we know that a reasonable sized laptop can produce approx. a 180 Mbit/s DoS attack with these commands”. This leads to the conclusion that a laptop has enough resources to exert the amount of CPU which would put the targeted server in a DoS state.

The researchers explained how the BlackNurse method performs DoS attacks using a low bandwidth connection of 15 to 18 Mbps. “This is to achieve the volume of packets needed which is around 40 to 50K packets per second. It does not matter if you have a 1 Gbit/s Internet connection. The impact we see on different firewalls is typically high CPU loads. When an attack is ongoing, users from the LAN site will no longer be able to send/receive traffic to/from the Internet. All firewalls we have seen recover when the attack stops.”

The TDC team managed to determine which devices are vulnerable to the BlackNurse attacks. The list is as follows:

Cisco ASA 5506, 5515, 5525, Cisco ASA 5550 and 5515-X Cisco Router 897. Some unverified Palo Alto SonicWall. Zyxel NWA3560-N and Zyxel Zywall USG50

The security specialists summed up their findings by pointing out that a certain type of device is most vulnerable to BlackNurse attacks. “We see the Cisco ASA firewall 55xx series to have the biggest problems. Even if you deny all ICMP traffic to the firewalls, they still suffer from the DOS attack, with as little as 4Mbit of traffic.”

TDC listed mitigations and SNORT IDS rules to assist users in detecting BlackNurse attacks. Another source of advice people can use is a post on GitHub, published by a security engineer for OVH. The technician provided a proof-of-concept (PoC) code which allows users to check if their device is vulnerable to BlackNurse attacks.

Independent software developers NETRESEC also made a contribution to the research efforts on the BlackNurse technology. They issued a blog post, titled “The 90’s called and wanted their ICMP flood attack back”. The publication outlines the risk of granting permission for ICMP unreachable message Type 3 while acknowledging TDC’s report. There is a conflict between the Cisco ASA 5500 manual, which recommends giving permission, and the analysis of TDC, which advises denying “ICMP Type 3 messages sent to the WAN interface of Cisco ASA firewalls to prevent the BlackNurse attack.”

Palo Alto also addressed TDC’s findings. To help users combat against the BlackNurse attacks, they issued an advisory and list of recommendations post.

The SANS Internet Storm Center are offering updates regarding the BlackNurse attacks to help users deal with the threat.

VirusGuide:             DDoS: Deceptive Denial Attacks:

 

« Four Amazing Cybersecurity Facts
New Business Protection From Cyber Attackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).