[nsp-sec] ddos against 1and1

Dirk Stander dst+nsp-sec at glaskugel.org
Sun Mar 3 14:03:45 EST 2013


1&1 is currently suffering a ddos attack against various portal sites.
It's a SYN flood, most probably spoofed, targeting the following IPs:

www.1and1.com TCP/80 (74.208.4.60),
admin.1and1.com TCP/443 (74.208.4.5) and
www.1and1.fr TCP/80 (212.227.216.63)

some packets:

14:49:47.291177 IP 202.102.60.209.31488 > 74.208.4.60.80: Flags [S], seq 3271755367, win 17473, options [mss 1460], length 0
        0x0000:  4500 002c 119b 4000 6d06 a5ed ca66 3cd1  E..,.. at .m....f<.
        0x0010:  4ad0 043c 7b00 0050 c303 0667 0000 0000  J..<{..P...g....
        0x0020:  6002 4441 b8e6 0000 0204 05b4 0000       `.DA..........
14:49:47.291177 IP 210.83.251.230.7729 > 74.208.4.60.80: Flags [S], seq 4229991952, win 17473, options [mss 1460], length 0
        0x0000:  4500 002c 2d38 4000 6e06 c24d d253 fbe6  E..,-8 at .n..M.S..
        0x0010:  4ad0 043c 1e31 0050 fc20 8e10 0000 0000  J..<.1.P........
        0x0020:  6002 4441 8dec 0000 0204 05b4 0000       `.DA..........
14:49:47.291178 IP 218.108.200.138.19477 > 74.208.4.60.80: Flags [S], seq 2466540794, win 17473, options [mss 1460], length 0
        0x0000:  4500 002c 2d4f 4000 6e06 ed79 da6c c88a  E..,-O at .n..y.l..
        0x0010:  4ad0 043c 4c15 0050 9304 6cfa 0000 0000  J..<L..P..l.....
        0x0020:  6002 4441 157e 0000 0204 05b4 0000       `.DA.~........
14:49:47.291179 IP 210.73.93.102.38701 > 74.208.4.60.80: Flags [S], seq 2035612187, win 17473, options [mss 1460], length 0
        0x0000:  4500 002c 429a 4000 7206 4776 d249 5d66  E..,B. at .r.Gv.I]f
        0x0010:  4ad0 043c 972d 0050 7954 fa1b 0000 0000  J..<.-.PyT......
        0x0020:  6002 4441 ca3b 0000 0204 05b4 0000       `.DA.;........

(the window size of 17473 seems to be a constant pattern)

The attack started today 2013-03-03, at 4:55 UTC with about 1.0Gbit/s (1.50M P/s)
against each target, with a peak at 8:30 UTC with 6.20Gbit/s (10.80M P/s).
The attack is ongoing and has an aggregated bandwith of about 20Gbit/s.

A good amount of the traffic enters 1&1:s backbone in Amsterdam coming from
Level3.

Does anyone recognise this attack pattern or has any intel about the botnet
used?

        Thanks, Dirk Stander



More information about the nsp-security mailing list