BlackNurse DDoS Attacks Are Small But Mighty.

BlackNurse is a revolutionary technology in the field of cyber-attacks. Hackers only need one laptop and minimal data to perform a DoS (denial of service) attack.

The BlackNurse attacks target Cisco, SonicWall, Palo Alto and Zyxel firewalls. This method requires small resources to bring down large servers offline.

The Security Operations Center of Danish telecom operator TDC did research on the BlackNurse attacks and wrote a report, detailing their technological aspects and their severity. The researchers highlighted that the method uses low bandwidth Internet Control Message Protocol (ICMP). They explained that BlackNurse “is capable of doing a denial of service to well-known firewalls”. The unusual aspect is that a hacker needs a simple device and a small amount of data to initiate an attack.

The TDC experts shared their observations on the method: “The BlackNurse attack attracted our attention, because in our anti-DDoS solution we experienced that even though traffic speed and packets per second were very low, this attack could keep our customers’ operations down. This even applied to customers with large internet uplinks and large enterprise firewalls in place. We had expected that professional firewall equipment would be able to handle the attack.”

The BlackNurse technology utilises ICMP Type 3 Code 3 “port unreachable” messages to attack a server. The goal of these messages is to overload the firewall’s CPU. As the research team wrote: “Based on our test, we know that a reasonable sized laptop can produce approx. a 180 Mbit/s DoS attack with these commands”. This leads to the conclusion that a laptop has enough resources to exert the amount of CPU which would put the targeted server in a DoS state.

The researchers explained how the BlackNurse method performs DoS attacks using a low bandwidth connection of 15 to 18 Mbps. “This is to achieve the volume of packets needed which is around 40 to 50K packets per second. It does not matter if you have a 1 Gbit/s Internet connection. The impact we see on different firewalls is typically high CPU loads. When an attack is ongoing, users from the LAN site will no longer be able to send/receive traffic to/from the Internet. All firewalls we have seen recover when the attack stops.”

The TDC team managed to determine which devices are vulnerable to the BlackNurse attacks. The list is as follows:

Cisco ASA 5506, 5515, 5525, Cisco ASA 5550 and 5515-X Cisco Router 897. Some unverified Palo Alto SonicWall. Zyxel NWA3560-N and Zyxel Zywall USG50

The security specialists summed up their findings by pointing out that a certain type of device is most vulnerable to BlackNurse attacks. “We see the Cisco ASA firewall 55xx series to have the biggest problems. Even if you deny all ICMP traffic to the firewalls, they still suffer from the DOS attack, with as little as 4Mbit of traffic.”

TDC listed mitigations and SNORT IDS rules to assist users in detecting BlackNurse attacks. Another source of advice people can use is a post on GitHub, published by a security engineer for OVH. The technician provided a proof-of-concept (PoC) code which allows users to check if their device is vulnerable to BlackNurse attacks.

Independent software developers NETRESEC also made a contribution to the research efforts on the BlackNurse technology. They issued a blog post, titled “The 90’s called and wanted their ICMP flood attack back”. The publication outlines the risk of granting permission for ICMP unreachable message Type 3 while acknowledging TDC’s report. There is a conflict between the Cisco ASA 5500 manual, which recommends giving permission, and the analysis of TDC, which advises denying “ICMP Type 3 messages sent to the WAN interface of Cisco ASA firewalls to prevent the BlackNurse attack.”

Palo Alto also addressed TDC’s findings. To help users combat against the BlackNurse attacks, they issued an advisory and list of recommendations post.

The SANS Internet Storm Center are offering updates regarding the BlackNurse attacks to help users deal with the threat.

VirusGuide:             DDoS: Deceptive Denial Attacks:

 

« Four Amazing Cybersecurity Facts
New Business Protection From Cyber Attackers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

GrammaTech

GrammaTech

GrammaTech is a leading developer of software-assurance tools and advanced cyber-security solutions.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Quantum Ventura

Quantum Ventura

Quantum Ventura is a technology innovation company with a single mission of delivering customer-centric advanced solutions to US Federal & State Governments and Private Sector customers.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.