Dealing with DDoS threats by KillNet, Anonymous Sudan and REvil
It has recently been reported that KillNet, Anonymous Sudan and REvil have made some credible threats of large-scale attacks against US & European banking systems in response to the Wests support of Ukraine in the on-going conflict between Ukraine and Russia.
F5 SIRT Guidance and Recommendations
- Protect your administrative interfaces from brute force attacks:
- Ensure that management ports are not accessible from the Internet (use VPNs, jump hosts, or similar, to isolate management from the Internet and other untrusted networks).
- Ensure strong passwords are in use for all accounts.
- Use MFA wherever possible.
- Ensure any public authentication systems are protected from brute force attacks, e.g., for HTTP/HTTPS services:
- Deploy BIG-IP Advanced WAF and configure Brute Force protection (e.g., https://techdocs.f5.com/en-us/bigip-16-1-0/big-ip-asm-implementations/mitigating-brute-force-attacks.html) and ensure IP Shunning is configured or,
- Deploy F5 Distributed Cloud Account Protection (https://www.f5.com/cloud/products/account-protection)
- Ensure robust DOS protections are in place for volumetric attacks:
- Deploy BIG-IP AFM Layer 4 DOS protections (e.g., https://my.f5.com/manage/s/article/K49869231) or,
- Deploy F5 Distributed Cloud DDoS Mitigation (https://www.f5.com/cloud/products/l3-and-l7-ddos-attack-mitigation) and/or,
- BIG-IP ASM Layer 7 DOS protections, ensuring Source IP based and/or GeoLocation based blocking is in use (https://my.f5.com/manage/s/article/K13410341)
- For on-prem systems the F5 SIRT also strongly recommends the use of IP Intelligence (an additional cost license option)
- Enforce GeoLocation blocking where possible, as previous attacks by Anonymous Sudan have shown traffic predominantly originating from specific regions, e.g.:
- Using BIG-IP AFM network firewall rules based on regions (e.g., https://techdocs.f5.com/en-us/bigip-15-1-0/big-ip-network-firewall-policies-and-implementations.html)
- Using BIG-IP Advanced WAF (e.g., https://my.f5.com/manage/s/article/K79414542) or, as a last resort and least-performant option,
- Using BIG-IP LTM and iRules (e.g., https://my.f5.com/manage/s/article/K43383890)
- Consider blocking any unnecessary HTTP methods (e.g., HEAD, PUT) as previous attacks by KillNet have utilised floods of specific methods. Allowed methods will need to be determined per application, but can be blocked using:
- BIG-IP Advanced WAF’s Allowed Methods list (by default, HEAD, GET and POST are allowed and all others are handled based on the configured Learning and Blocking Settings) or,
- BIG-IP LTM iRules with a rule like this: https://my.f5.com/manage/s/article/K85840901
- To reduce the risk of malware/ransomware attacks:
- Ensure users are educated on Phishing attacks; how to spot them, what to do if one is received.
- Have proper internal processes in place to handle reports of suspicious messages.
- Ensure there is a process in place to remediate known vulnerabilities:
- Ensure BIG-IP, NGINX etc instances are running up-to-date versions.
- Prioritize the patching of known exploited vulnerabilities on all systems, regardless of vendor.
If any further intelligence becomes available which informs more specific guidance, we will add that here and in K000135063.
1 Comment
- AaronJBRet. Employee
Since posting, I see that Microsoft have announced guidance based on their analysis of early June outages; Microsoft attribute those outages to actions by Storm-1359 while Anonymous Sudan claim responsibility (we could, therefore, posit that Storm-1359 is likely to be Anonymous Sudan & KillNet).
Microsoft's advice aligns well with our own, above.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)