Security News > 2018 > February > Misconfigured Memcached Servers Abused to Amplify DDoS Attacks

2018-02-28 20:55
Over the past few days researchers say DDoS attacks have been using memcached servers to amplify DDoS attacks using UDP-based packets.
News URL
http://threatpost.com/misconfigured-memcached-servers-abused-to-amplify-ddos-attacks/130150/
Related news
- Over 3 million mail servers without encryption exposed to sniffing attacks (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Over 660,000 Rsync servers exposed to code execution attacks (source)
- Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack (source)
- Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices (source)
- Mirai botnet behind the largest DDoS attack to date (source)
- New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks (source)
- DDoS attacks reportedly behind DayZ and Arma network outages (source)
- Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks (source)
- New OpenSSH flaws expose SSH servers to MiTM and DoS attacks (source)