<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Latest DDOS attack related issue on Palo alto in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/latest-ddos-attack-related-issue-on-palo-alto/m-p/432507#M1307</link>
    <description>&lt;P&gt;Hey guys one of my client having a concern about the security patch. he has PA-820 PA and PA-220. The New DDOS attack is there ID is CIAD-2021-0030&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://clicktime.symantec.com/3QdtY9QLh9kb4B5ny33Z2KD7Vc?u=https%3A%2F%2Fwww.cert-in.org.in%2F" target="_blank" rel="noopener"&gt;https://clicktime.symantec.com/3QdtY9QLh9kb4B5ny33Z2KD7Vc?u=https%3A%2F%2Fwww.cert-in.org.in%2F&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Please check the Palo alto firewall is capable to handle this attack. is Palo alto have this security patch. I also mention the details about attack&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Severity Rating: High&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Description&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;A potential new method of DDoS attack has been identified that exploit a&lt;/DIV&gt;&lt;DIV&gt;loophole in the security middle boxes such as Intrusion Prevention Systems&lt;/DIV&gt;&lt;DIV&gt;(IPS), NextGen Firewalls, Network Address Translators (NATs) and Load&lt;/DIV&gt;&lt;DIV&gt;balancers etc.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The attack is carried out by sending a specially crafted sequence of&lt;/DIV&gt;&lt;DIV&gt;packets to misconfigured security middle boxes deceiving it into believing&lt;/DIV&gt;&lt;DIV&gt;a 3-way handshake is completed thus allowing TCP communication. The&lt;/DIV&gt;&lt;DIV&gt;attacker sends an HTTP request for a website likely to be blocked at the&lt;/DIV&gt;&lt;DIV&gt;security device, spoofing the IP Address of the victim, to which the&lt;/DIV&gt;&lt;DIV&gt;security device responds with a large HTML blocking notification page which&lt;/DIV&gt;&lt;DIV&gt;results in amplification effect. It is reported that the attacker can&lt;/DIV&gt;&lt;DIV&gt;achieve an amplification factor up to 100,000,000.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;II. Measures to be adopted to protect against DDoS attacks.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;1. Measures for detection of attacks:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Understand your current environment and have a baseline of the daily&lt;/DIV&gt;&lt;DIV&gt;volume, type and performance of network traffic.&lt;/DIV&gt;&lt;DIV&gt;Enable adequate logging mechanisms at perimeter, server, system level and&lt;/DIV&gt;&lt;DIV&gt;review the logs at frequent intervals.&lt;/DIV&gt;&lt;DIV&gt;Continuously monitor the network activities &amp;amp; server logs to detect and&lt;/DIV&gt;&lt;DIV&gt;mitigate suspicious and malicious activities in your network. Review the&lt;/DIV&gt;&lt;DIV&gt;traffic patterns and logs of perimeter devices to detect anomalies in&lt;/DIV&gt;&lt;DIV&gt;traffic, network level floods(TCP, UDP, SYN, etc.) and application floods&lt;/DIV&gt;&lt;DIV&gt;(HTTP GET) etc.&lt;/DIV&gt;&lt;DIV&gt;Preserve all logs indicating type of attack and attack sources.&lt;/DIV&gt;&lt;DIV&gt;2. Protection measures:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thoroughly scan the network and online applications and plug any existing&lt;/DIV&gt;&lt;DIV&gt;vulnerability in the network devices, operating systems, server software&lt;/DIV&gt;&lt;DIV&gt;and application software and apply latest patches/updates as applicable.&lt;/DIV&gt;&lt;DIV&gt;Employ defense-in-depth strategies: emphasize multiple, overlapping and&lt;/DIV&gt;&lt;DIV&gt;mutually supportive defensive systems to guard against single point&lt;/DIV&gt;&lt;DIV&gt;failures in any specific technology and protection method.&lt;/DIV&gt;&lt;DIV&gt;Deploy appropriate Intrusion/DDoS Prevention System capable of detecting&lt;/DIV&gt;&lt;DIV&gt;and mitigating DDoS attacks. Ensure that Intrusion/DDoS Prevention System&lt;/DIV&gt;&lt;DIV&gt;contain signatures to detect the attacks launched from common attack tools.&lt;/DIV&gt;&lt;DIV&gt;Sudden surge in inbound traffic to any critical server or services, such as&lt;/DIV&gt;&lt;DIV&gt;ICMP floods, UDP/TCP flood etc. could be due to DDoS attacks. If such&lt;/DIV&gt;&lt;DIV&gt;attacks are observed, implement appropriate response measures in&lt;/DIV&gt;&lt;DIV&gt;coordination with Internet Service Provider (ISP).&lt;/DIV&gt;&lt;DIV&gt;Identify and block the attack sources at Router/Packet filtering&lt;/DIV&gt;&lt;DIV&gt;device/DDoS prevention solutions. Disable non-essential ports/services.&lt;/DIV&gt;&lt;DIV&gt;To counter attacks on applications, check the integrity of critical&lt;/DIV&gt;&lt;DIV&gt;application files periodically and in case of suspicion of attack restore&lt;/DIV&gt;&lt;DIV&gt;applications and content from trusted backups.&lt;/DIV&gt;&lt;DIV&gt;Maintain list of contacts of ISPs, vendors of network and security devices&lt;/DIV&gt;&lt;DIV&gt;and contact them as appropriate.&lt;/DIV&gt;&lt;DIV&gt;In case your SLA with ISP includes DDoS mitigation services instruct your&lt;/DIV&gt;&lt;DIV&gt;staff about the requirements to be sent to ISP.&lt;/DIV&gt;&lt;DIV&gt;Have a Business Continuity Plan and Disaster Recovery Plan ready for&lt;/DIV&gt;&lt;DIV&gt;activation in case of emergency.&lt;/DIV&gt;</description>
    <pubDate>Wed, 08 Sep 2021 06:42:32 GMT</pubDate>
    <dc:creator>FarhanKoujalgi</dc:creator>
    <dc:date>2021-09-08T06:42:32Z</dc:date>
    <item>
      <title>Latest DDOS attack related issue on Palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/latest-ddos-attack-related-issue-on-palo-alto/m-p/432507#M1307</link>
      <description>&lt;P&gt;Hey guys one of my client having a concern about the security patch. he has PA-820 PA and PA-220. The New DDOS attack is there ID is CIAD-2021-0030&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://clicktime.symantec.com/3QdtY9QLh9kb4B5ny33Z2KD7Vc?u=https%3A%2F%2Fwww.cert-in.org.in%2F" target="_blank" rel="noopener"&gt;https://clicktime.symantec.com/3QdtY9QLh9kb4B5ny33Z2KD7Vc?u=https%3A%2F%2Fwww.cert-in.org.in%2F&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Please check the Palo alto firewall is capable to handle this attack. is Palo alto have this security patch. I also mention the details about attack&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Severity Rating: High&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Description&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;A potential new method of DDoS attack has been identified that exploit a&lt;/DIV&gt;&lt;DIV&gt;loophole in the security middle boxes such as Intrusion Prevention Systems&lt;/DIV&gt;&lt;DIV&gt;(IPS), NextGen Firewalls, Network Address Translators (NATs) and Load&lt;/DIV&gt;&lt;DIV&gt;balancers etc.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The attack is carried out by sending a specially crafted sequence of&lt;/DIV&gt;&lt;DIV&gt;packets to misconfigured security middle boxes deceiving it into believing&lt;/DIV&gt;&lt;DIV&gt;a 3-way handshake is completed thus allowing TCP communication. The&lt;/DIV&gt;&lt;DIV&gt;attacker sends an HTTP request for a website likely to be blocked at the&lt;/DIV&gt;&lt;DIV&gt;security device, spoofing the IP Address of the victim, to which the&lt;/DIV&gt;&lt;DIV&gt;security device responds with a large HTML blocking notification page which&lt;/DIV&gt;&lt;DIV&gt;results in amplification effect. It is reported that the attacker can&lt;/DIV&gt;&lt;DIV&gt;achieve an amplification factor up to 100,000,000.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;II. Measures to be adopted to protect against DDoS attacks.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;1. Measures for detection of attacks:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Understand your current environment and have a baseline of the daily&lt;/DIV&gt;&lt;DIV&gt;volume, type and performance of network traffic.&lt;/DIV&gt;&lt;DIV&gt;Enable adequate logging mechanisms at perimeter, server, system level and&lt;/DIV&gt;&lt;DIV&gt;review the logs at frequent intervals.&lt;/DIV&gt;&lt;DIV&gt;Continuously monitor the network activities &amp;amp; server logs to detect and&lt;/DIV&gt;&lt;DIV&gt;mitigate suspicious and malicious activities in your network. Review the&lt;/DIV&gt;&lt;DIV&gt;traffic patterns and logs of perimeter devices to detect anomalies in&lt;/DIV&gt;&lt;DIV&gt;traffic, network level floods(TCP, UDP, SYN, etc.) and application floods&lt;/DIV&gt;&lt;DIV&gt;(HTTP GET) etc.&lt;/DIV&gt;&lt;DIV&gt;Preserve all logs indicating type of attack and attack sources.&lt;/DIV&gt;&lt;DIV&gt;2. Protection measures:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thoroughly scan the network and online applications and plug any existing&lt;/DIV&gt;&lt;DIV&gt;vulnerability in the network devices, operating systems, server software&lt;/DIV&gt;&lt;DIV&gt;and application software and apply latest patches/updates as applicable.&lt;/DIV&gt;&lt;DIV&gt;Employ defense-in-depth strategies: emphasize multiple, overlapping and&lt;/DIV&gt;&lt;DIV&gt;mutually supportive defensive systems to guard against single point&lt;/DIV&gt;&lt;DIV&gt;failures in any specific technology and protection method.&lt;/DIV&gt;&lt;DIV&gt;Deploy appropriate Intrusion/DDoS Prevention System capable of detecting&lt;/DIV&gt;&lt;DIV&gt;and mitigating DDoS attacks. Ensure that Intrusion/DDoS Prevention System&lt;/DIV&gt;&lt;DIV&gt;contain signatures to detect the attacks launched from common attack tools.&lt;/DIV&gt;&lt;DIV&gt;Sudden surge in inbound traffic to any critical server or services, such as&lt;/DIV&gt;&lt;DIV&gt;ICMP floods, UDP/TCP flood etc. could be due to DDoS attacks. If such&lt;/DIV&gt;&lt;DIV&gt;attacks are observed, implement appropriate response measures in&lt;/DIV&gt;&lt;DIV&gt;coordination with Internet Service Provider (ISP).&lt;/DIV&gt;&lt;DIV&gt;Identify and block the attack sources at Router/Packet filtering&lt;/DIV&gt;&lt;DIV&gt;device/DDoS prevention solutions. Disable non-essential ports/services.&lt;/DIV&gt;&lt;DIV&gt;To counter attacks on applications, check the integrity of critical&lt;/DIV&gt;&lt;DIV&gt;application files periodically and in case of suspicion of attack restore&lt;/DIV&gt;&lt;DIV&gt;applications and content from trusted backups.&lt;/DIV&gt;&lt;DIV&gt;Maintain list of contacts of ISPs, vendors of network and security devices&lt;/DIV&gt;&lt;DIV&gt;and contact them as appropriate.&lt;/DIV&gt;&lt;DIV&gt;In case your SLA with ISP includes DDoS mitigation services instruct your&lt;/DIV&gt;&lt;DIV&gt;staff about the requirements to be sent to ISP.&lt;/DIV&gt;&lt;DIV&gt;Have a Business Continuity Plan and Disaster Recovery Plan ready for&lt;/DIV&gt;&lt;DIV&gt;activation in case of emergency.&lt;/DIV&gt;</description>
      <pubDate>Wed, 08 Sep 2021 06:42:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/latest-ddos-attack-related-issue-on-palo-alto/m-p/432507#M1307</guid>
      <dc:creator>FarhanKoujalgi</dc:creator>
      <dc:date>2021-09-08T06:42:32Z</dc:date>
    </item>
  </channel>
</rss>

