• Latest
  • Trending
  • All
A Persistent Protocol Vulnerability Poses Long-Term Threat to Web Security

A Persistent Protocol Vulnerability Poses Long-Term Threat to Web Security

November 6, 2023
Top Free Remote Access Software Tools for Efficient Work Collaboration

Top Free Remote Access Software Tools for Efficient Work Collaboration

November 27, 2023
Top 5 Free Remote Access Software Tools for Efficient Computer Control

Top 5 Free Remote Access Software Tools for Efficient Computer Control

November 20, 2023
Simplifying Remote Access to Your Computer

Simplifying Remote Access to Your Computer

November 13, 2023
Transparent Tribe Exploits Fake YouTube Android Apps to Spread CapraRAT Malware

Transparent Tribe Exploits Fake YouTube Android Apps to Spread CapraRAT Malware

October 30, 2023
Thousands of Juniper Firewalls at Risk from Critical RCE Vulnerability

Thousands of Juniper Firewalls at Risk from Critical RCE Vulnerability

October 23, 2023
 Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

 Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

October 16, 2023
Ongoing Campaign of Undetectable Ad Fraud Targets Korean Android Users

Ongoing Campaign of Undetectable Ad Fraud Targets Korean Android Users

October 9, 2023
Preparing for Quantum-Powered Attacks: A Guide for Businesses

Preparing for Quantum-Powered Attacks: A Guide for Businesses

October 2, 2023
The Impending Threat of 'Steal Now, Crack Later' Quantum Computing

The Impending Threat of ‘Steal Now, Crack Later’ Quantum Computing

September 25, 2023
The Dominance of Email as the Primary Attack Vector

The Dominance of Email as the Primary Attack Vector

September 18, 2023
Devastating Ransomware Attack Paralyzes Danish Cloud Provider

Devastating Ransomware Attack Paralyzes Danish Cloud Provider

September 11, 2023
The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

September 4, 2023
  • Activity
  • Lab
  • Members
26 °c
Ashburn
28 ° Thu
26 ° Fri
24 ° Sat
24 ° Sun
24 ° Mon
24 ° Tue
Test Your Security
Sunday, December 3, 2023
No Result
View All Result
  • Login
  • Register
Innocent Michael
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
Innocent Michael
No Result
View All Result
Home Threats

A Persistent Protocol Vulnerability Poses Long-Term Threat to Web Security

Cyber Intelligence by Cyber Intelligence
4 weeks ago
in Threats
247 5
A A
0
A Persistent Protocol Vulnerability Poses Long-Term Threat to Web Security
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

Leading tech giants Google, Amazon, Microsoft, and Cloudflare recently disclosed that they successfully defended against massive distributed denial of service (DDoS) attacks on their cloud infrastructure in August and September. DDoS attacks, which aim to overwhelm a service with excessive traffic, have long plagued the internet, and hackers continuously develop new tactics to make them more potent. However, these recent attacks drew considerable attention due to the exploitation of a vulnerability in a fundamental web protocol. As a result, while efforts to patch the vulnerability are underway, comprehensive fixes must be implemented across all global web servers to fully eradicate these types of attacks.

Named “HTTP/2 Rapid Reset,” this vulnerability can only be exploited for denial of service attacks and does not enable attackers to take control of a server or extract data remotely. Nevertheless, even a straightforward attack can have severe repercussions, as availability is crucial for accessing any digital service, from critical infrastructure to essential information.

Related articles

Transparent Tribe Exploits Fake YouTube Android Apps to Spread CapraRAT Malware

Transparent Tribe Exploits Fake YouTube Android Apps to Spread CapraRAT Malware

1 month ago
1.4k
 Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

 Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

2 months ago
1.4k

Emil Kiner and Tim April from Google Cloud emphasized the wide-ranging impact of DDoS attacks on victim organizations, including business losses and the unavailability of mission-critical applications. They further noted that recovery from such attacks can extend well beyond the attack’s duration.

The origin of this vulnerability is noteworthy as well. Rapid Reset is not tied to a specific software but resides in the specification for the HTTP/2 network protocol, which is used for loading webpages. Developed by the Internet Engineering Task Force (IETF) approximately eight years ago, HTTP/2 is the faster and more efficient successor to the traditional HTTP protocol. HTTP/2’s extensive adoption is due to its improved performance on mobile devices and reduced bandwidth usage. Currently, IETF is working on developing HTTP/3.

Lucas Pardue and Julien Desgats of Cloudflare highlighted that since the attack exploits an inherent weakness in the HTTP/2 protocol, any vendor utilizing HTTP/2 is susceptible. While a minority of implementations seem unaffected by Rapid Reset, Pardue and Desgats stressed that the issue is relevant to “every modern web server.”

Unlike vulnerabilities in specific software, a flaw in a protocol cannot be fixed by a single central entity because each website implements the standard differently. While major cloud services and DDoS defense providers play a crucial role in securing their infrastructure, organizations and individuals running their own web servers must develop their own protective measures.

Dan Lorenc, CEO of ChainGuard, a software supply chain security company, noted that this situation underscores the value of open source availability and code reuse. Many web servers likely adopted their HTTP/2 implementation from existing sources rather than building from scratch. If these projects are well-maintained, they will develop Rapid Reset fixes that can be widely deployed.

However, the process of full adoption of these patches will take years, and some services might have implemented their own HTTP/2 from scratch, leaving them vulnerable without a patch from another source.

Lorenc added that the big tech companies discovered this vulnerability while it was being actively exploited. The vulnerability can be exploited to disrupt operational technology or industrial control systems, which raises significant concerns.

Though the recent string of DDoS attacks on major tech companies raised alarm bells due to their scale, these companies were able to repel the attacks without lasting damage. However, the attacks did expose the vulnerability in the protocol and its potential exploitation, also known as “burning a zero day” in the security community. Despite the time required for patching and the long-term vulnerability of some web servers, the internet is now safer because attackers revealed the flaw.

Lorenc expressed curiosity about why someone decided to expose this vulnerability, considering its novelty and potential value if kept secret or sold for a significant sum.

Share196Tweet123
Cyber Intelligence

Cyber Intelligence

Subscribe
Connect with
Login
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
Notify of
guest
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
guest
0 Comments
Inline Feedbacks
View all comments
Innocent Michael

Copyright © 2023 Inncent Michael.

Navigate Site

  • Activity
  • Lab
  • Members

Follow Us

Test Your Security
No Result
View All Result
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
  • Login
  • Sign Up

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Update Contents