The attack is over and I thought I'd give some information about it. Firstly the server has a 120Mb internet line. It can peak to about 133Mb/s but in general it's about 120Mb-125Mb.
The volume of data we received during the two attacks easily surpassed our line speed. So it was over 120Mb. Here is a graph showing the attack while it was ongoing:
Now you can see the bandwidth use was going nice and low and then boom, attack begins (this is the 2nd one of the night) and instantly bandwidth use spikes up to 16,000KB/s which is exactly 125Mb/s - our line speed. This indicates the attack is much larger than our line speed, but I cannot see just how big it is as we're already maxed out at 125Mb/s
At this speed I'm receiving 15.6MB per second / 56GB per hour. So lets look at how much data I received over the two attacks:
Those two large orange spikes, those are the attacks each of which lasted over an hour. You can see in the bottom right that during just the last 24 hours (which is what the graph shows) I received 131GB of data. This is a lot more than usual. I usually receive about 20-30GB so the attackers essentially sent me around 100GB of data during a 3 hour period last night.
Here is the last couple days of data use, remember the first attack began on the 15th of January and the 2nd attack began on the 16th of January so it crosses over the first two dates.
So who is responsible? Well unless they come forward and say it was them we may never know for sure. This attack wasn't very highly sophisticated but it did make use of a well known problem with the internet, misconfigured DNS servers.
On the internet everyone uses a DNS server, it's how when you type in to your browser "google.com" you receive back googles address which is "62.252.169.152" every single website or service where you enter in a name, those names are being looked up in a database for their IP Address and then that is being sent back to your computer.
Even when you use survival.renmx.com in your game client your DNS server (provided by your internet provider unless you've changed it to another DNS server) sends back our servers IP.
Misconfigured DNS servers, vulnerable ones (remember anyone on the internet can setup a DNS server, even in their home on their own PC if they wanted to) sometimes run completely unrestricted meaning they will send out data to anyone that queries them.
So the way attackers abuse this is by sending them a lookup request for a domain but instead of using their own IP Address in the data packet that they send to the DNS Server they use their victims IP instead. They essentially send a letter with the return address listed as their victims.
So the DNS Server receives this request in good faith and tries to reply to it, but because the attacker has used (in this case) my IP, the response from the DNS Server gets sent to me instead. Now multiply this by thousands of DNS Servers all over the globe and my internet connection is quickly swamped with trash data which is overwhelming my internet connection.
To put it another way, imagine you are trying to make a telephone call but 10,000 people are all trying to call your telephone number at the same time, it would be impossible for you to dial your friend. That is what happened to us with all this incoming data not allowing legitimate traffic (from our players and such) to get through.
There are three reasons why this attack is easy to do and why it is used more and more commonly.
- Firstly it is much easier to spoof the IP Address of someone else on the internet using a UDP packet than it is a TCP packet. UDP is connectionless and DNS servers use UDP.
---
- Secondly DNS Servers are low hanging fruit there are thousands perhaps millions of unsecured ones all over the globe in offices, homes and data centres.
---
- Thirdly the return traffic from the DNS Server can be up to 8x larger than the query sent to the DNS server, so by using this method the attacker actually is able to multiply their attack strength by 8 times. (Attacker 1Gb/s -> 8Gb/s once DNS servers reply)
So that is everything there is to know about what happened. The good news is, our Modem, Router and Server were all running fine, nothing crashed and as soon as the attack ended normal service resumed.