Researchers attributed Domain Name System Security Extensions (DNSSEC) with fueling the new wave of DNS amplification attacks, which accounted for more than 65% of the attacks last quarter according to the team’s evaluation of thousands of worldwide DDoS attacks.
DNSSEC was designed to protect applications from using forged or manipulated DNS data, and its growing adoption suggests that DNS amplification risks won’t disappear for service providers or enterprise networks anytime soon. According to the quarterly report, Paypal.com and multiple government domains fell victim to rampant DNS abuses, likely due to many of these domains deploying DNSSEC to the top-level .gov domain, as required by the U.S. government’s mandate from the Office of Management and Budget.
When blocking DNS amplification attacks, it’s not realistic to drop all DNS associated traffic, since users rely on DNS services to access the Internet, and the tactic could deny service to paying customers. Researchers warn that service providers must ensure their attack mitigation technology is advanced enough to ensure server availability to legitimate end users, to ensure their access doesn’t become collateral damage."
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street