Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » SNMP DDoS scans spoof Google public DNS server

SNMP DDoS scans spoof Google public DNS server

2014/09/15

Threatpost - (International) The SANS Internet Storm Center reported September 15 that large-scale scans of Simple Network Management Protocol (SNMP) spoofing Google's public DNS server traffic were taking place, indicating a scan being used to identify routers and devices using default SNMP passwords. Vulnerable routers and devices could have their configuration variables changed, creating a denial of service (DoS) situation on the affected devices.

Source: http://threatpost.com/snmp-based-ddos-attack-spoofs-google-public-dns-server

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:43