SlideShare a Scribd company logo
Memcached amplification
Artyom Gavrichenkov <ag@qrator.net>
2
300 Mbps
30 Gbps
Typical amplification attack
A vulnerable server
• Most servers on the
Internet send more
data to a client than
they receive
• UDP-based servers
generally do not
verify the source IP
address
• This allows for
amplification DDoS
• NTP
• DNS
• SNMP
• SSDP
• ICMP
• NetBIOS
3
• RIPv1
• PORTMAP
• CHARGEN
• QOTD
• Quake
• …
Vulnerable protocols
Vulnerable servers
Amplification factor
0
200
400
600
NTP
CharGEN
QotD
RIPv1
Quake
LDAP
SSDP
memcached
•A fast in-memory cache
•Heavily used in Web development
memcached
•A fast in-memory cache
•Heavily used in Web development
•Listens on all interfaces, port 11211, by default
memcached
•Basic ASCII protocol doesn’t do authentication
•2014, Blackhat USA:
“An attacker can inject arbitrary data into memory”
memcached
•Basic ASCII protocol doesn’t do authentication
•2014, Blackhat USA:
“An attacker can inject arbitrary data into memory”
•2017, Power of Community:
“An attacker can send data from memory
to a third party via spoofing victim’s IP address”
import memcache
m = memcache.Client([
‘reflector.example.com:11211’
])
m.set(’a’, value)
– to inject a value of an
arbitrary size under key “a”
print ’0x01000x0100gets arn’
– to retrieve a value
print ’0x01000x0100gets a a a a arn’
– to retrieve a value 5 times
print ’0x01000x0100gets a a a a arn’
– to retrieve a value 5 times.
Or 10 times.
Or a hundred.
memcached
•Theoretical amplification factor is millions
memcached
•Theoretical amplification factor is billions
•Fortunately, all the packets aren’t sent at once
•In practice, the amplification factor is 9000-10000
•Still 20 times the NTP Amplification does.
•Current incidents range between 200 and 500 Gbps
•Up to 1,5 Tbps can be expected
Mitigation
•Again, BCP 38.
•Make sure you don’t have
open memcached port 11211/udp on your network
•Use firewalls or FlowSpec to filter 11211/udp
Mitigation
•Again, BCP 38.
•Make sure you don’t have
open memcached port 11211/udp on your network
•Use firewalls or FlowSpec to filter 11211/udp
•More news as events warrant
Q&A
mailto: Artyom Gavrichenkov <ag@qrator.net>
https://medium.com/@qratorlabs/

More Related Content

PDF
Varnish SSL / TLS
PPTX
Maximizing PHP Performance with NGINX
PPTX
NGINX for Application Delivery & Acceleration
PPTX
Choosing A Proxy Server - Apachecon 2014
PPTX
Analyzing NGINX Logs with Datadog
PDF
What's New in NGINX Plus R12?
PPTX
NGINX Plus R20 Webinar
PDF
Lcu14 Lightning Talk- NGINX
Varnish SSL / TLS
Maximizing PHP Performance with NGINX
NGINX for Application Delivery & Acceleration
Choosing A Proxy Server - Apachecon 2014
Analyzing NGINX Logs with Datadog
What's New in NGINX Plus R12?
NGINX Plus R20 Webinar
Lcu14 Lightning Talk- NGINX

What's hot (20)

PDF
Building your own CDN using Amazon EC2
PDF
Virus Bulletin 2012
PDF
Overview of SSL: choose the option that's right for you
PPTX
ModSecurity 3.0 and NGINX: Getting Started - EMEA
PPTX
Usenix LISA 2012 - Choosing a Proxy
PDF
DDoS Attacks - Scenery, Evolution and Mitigation
PDF
Using NGINX as an Effective and Highly Available Content Cache
PDF
What is Nginx and Why You Should to Use it with Wordpress Hosting
PPTX
Flawless Application Delivery with NGINX Plus
PDF
Content Caching with NGINX and NGINX Plus
PPTX
Managing Traffic Spikes This Holiday Season
PDF
Nanog66 vicente de luca fast netmon
PDF
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
PDF
High Availability Content Caching with NGINX
PDF
Webinar SSL English
PDF
Load Balancing with Nginx
PPTX
HTTP/2: Ask Me Anything
PPTX
What’s New in NGINX Plus R16?
PPTX
Drupal 8 and NGINX
PPTX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
Building your own CDN using Amazon EC2
Virus Bulletin 2012
Overview of SSL: choose the option that's right for you
ModSecurity 3.0 and NGINX: Getting Started - EMEA
Usenix LISA 2012 - Choosing a Proxy
DDoS Attacks - Scenery, Evolution and Mitigation
Using NGINX as an Effective and Highly Available Content Cache
What is Nginx and Why You Should to Use it with Wordpress Hosting
Flawless Application Delivery with NGINX Plus
Content Caching with NGINX and NGINX Plus
Managing Traffic Spikes This Holiday Season
Nanog66 vicente de luca fast netmon
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
High Availability Content Caching with NGINX
Webinar SSL English
Load Balancing with Nginx
HTTP/2: Ask Me Anything
What’s New in NGINX Plus R16?
Drupal 8 and NGINX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
Ad

More from APNIC (20)

PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
DNSSEC Made Easy, presented at PHNOG 2025
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
PDF
IPv6 Deployment and Best Practices, presented by Makito Lay
PDF
Cleaning up your RPKI invalids, presented at PacNOG 35
PDF
The Internet - By the numbers, presented at npNOG 11
PDF
Transmission Control Protocol (TCP) and Starlink
PDF
DDoS in India, presented at INNOG 8 by Dave Phelan
PDF
Global Networking Trends, presented at the India ISP Conclave 2025
PDF
Make DDoS expensive for the threat actors
PDF
Fast Reroute in SR-MPLS, presented at bdNOG 19
PDF
DDos Mitigation Strategie, presented at bdNOG 19
PDF
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
PDF
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
PDF
Measuring Starlink Protocol Performance, presented at LACNIC 43
APNIC Report, presented at APAN 60 by Thy Boskovic
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
The Internet -By the Numbers, Sri Lanka Edition
Triggering QUIC, presented by Geoff Huston at IETF 123
DNSSEC Made Easy, presented at PHNOG 2025
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
IPv6 Deployment and Best Practices, presented by Makito Lay
Cleaning up your RPKI invalids, presented at PacNOG 35
The Internet - By the numbers, presented at npNOG 11
Transmission Control Protocol (TCP) and Starlink
DDoS in India, presented at INNOG 8 by Dave Phelan
Global Networking Trends, presented at the India ISP Conclave 2025
Make DDoS expensive for the threat actors
Fast Reroute in SR-MPLS, presented at bdNOG 19
DDos Mitigation Strategie, presented at bdNOG 19
ICP -2 Review – What It Is, and How to Participate and Provide Your Feedback
APNIC Update - Global Synergy among the RIRs: Connecting the Regions
Measuring Starlink Protocol Performance, presented at LACNIC 43
Ad

Recently uploaded (20)

PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Reading as a good Form of Recreation
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPT
Ethics in Information System - Management Information System
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
Internet Safety for Seniors presentation
PPTX
The-Importance-of-School-Sanitation.pptx
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
t_and_OpenAI_Combined_two_pressentations
Reading as a good Form of Recreation
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Alethe Consulting Corporate Profile and Solution Aproach
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Ethics in Information System - Management Information System
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Internet Safety for Seniors presentation
The-Importance-of-School-Sanitation.pptx
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Uptota Investor Deck - Where Africa Meets Blockchain
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Cyber Hygine IN organizations in MSME or
Alethe Consulting Corporate Profile and Solution Aproach
Layers_of_the_Earth_Grade7.pptx class by
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf

Memcached amplification DDoS: a 2018 threat