The cyber attack exploited the Network Time Protocol , a system for clock synchronisation between computer systems, by sending requests with fake source IP addresses to NTP servers.
The cyber attack exploited the Network Time Protocol , a system for clock synchronisation between computer systems, by sending requests with fake source IP addresses to NTP servers.
In December 2013, Symantec warned that cybercriminals were increasingly abusing the Network Time Protocol (NTP) for distributed denial-of-service (DDOS) attacks. Experts say that this type of attack was also used to disrupt popular online gaming services in the first days of 2014. The list of targeted games includes World…
DNS amplification distributed denial-of-service (DDOS) is not the only type of efficient DDOS attack. Over the past days, researchers have spotted Network Time Protocol (NTP) reflection attacks being launched by cybercriminals. They are abusing poorly configured servers to launch cyberattacks against the systems of …
Latest Comments