Categories: All

BitTorrent Patches Flaw That Allowed Website Killing DRDoS Attacks


SPR’s: Today in its blog, BitTorrent announced that it has fixed a vulnerability that allowed the attackers to take down websites by carrying out distributed reflective denial of service attacks (DRDoS).

Recently Florian Adamsky gave a presentation at a USENIX Workshop tell the possibilities of exploiting UDP-based protocols for DRDoS attacks. uTorrent, BitTorrent, and BitTorrent Sync use the Micro Transport Protocol (µTP) implementation in libuTP as the preferred transport backend running on top of UDP. Due to this, the attacker with modest resources could exploit a BitTorrent user unknowingly and drive a large volume of traffic to the victim to make them offline.
However, Christian Averill, Vice President of Communications and Brand for BitTorrent, tells fossBytes that such an attack has not been observed in the wild. He states: “First, it’s important to understand that this is a theoretical scenario and that such an attack has not been observed in the wild. Florian Adamsky and his co-authors conducted an experiment in a controlled environment producing the results presented in the paper.”
In his recent blog post, he outlines the fact that the BitTorrent engineering team has mitigated any distant possibility of such an attack. In another post, Francisco De La Cruz, software engineer on the uTorrent/BitTorrent team, tells how such an attack works and further explains the steps taken by his team.
Christian tells fossBytes that Florian and the co-authors reported their findings to BitTorrent team responsibly few weeks back and they have issued a fix to the torrent client.
He also shares an interesting point about the vulnerability in Sync. “Even before the recent updates to Sync, the severity of the vulnerability was reduced by a few factors. First, the attacker would have to know the Sync user they are trying to exploit to get their “Secret” – or the Sync user would have to have exposed that “Secret” publicly in some way. In addition, Sync, by design, limits the amount of peers in a share making the attack surface much smaller. It would not serve as an effective source to mount large-scale attacks,” he explains.
Having something to add? Share your opinions through comments.
spatsariya

Recent Posts

Cathie Wood Doubles Down on CoreWeave Stock Despite Wall Street Caution

People listen when Cathie Wood, who made a name on making risky bets on new…

51 minutes ago

Perplexity Adds Live Earnings Call Transcripts for Indian Stocks

AI-powered startup Perplexity has just implemented a new feature into its Finance dashboard, which transcribes…

1 hour ago

A Friendlier, More Approachable AI Model

The release of GPT-5 by OpenAI has been one of the most discussed events in…

1 hour ago

Android Users Must Delete Apps Within 48 Hours

Amazon has announced one of the most significant changes, which concerns millions of Android users.…

3 hours ago

Apple’s Surprise iPhone Update Brings Back Blood Oxygen Monitoring

This week, Apple unacceptably surprised the iPhone audience with the release of iOS 18.6.1. People…

3 hours ago

Release Date, Price, Features, and More

Tesla is taking the next step toward making electric cars more affordable, reliable, and sustainable…

8 hours ago