Citrix devices are being used as DDoS attack vectors

Citrix

Images: Citrix // Composition: ZDNet

Threat agents have found a way to bounce and amplify junk web traffic against Citrix ADC network equipment to launch DDoS attacks.

While details about the attackers are still unknown, the victims of these Citrix-based DDoS attacks mainly included online gaming services, such as Steam and Xbox, sources told ZDNet earlier today.

The first of these attacks was detected last week and documented by German IT systems administrator Marco Hofmann.

Hofmann tracked down the problem with the DTLS interface on Citrix ADC devices.

DTLS, or Datagram Transport Layer Security, is another version of the TLS protocol implemented in the flow-friendly UDP transfer protocol, instead of the more reliable TCP.

Like all UDP-based protocols, DTLS is spoofable and can be used as a DDoS amplification vector.

This means that attackers can send small DTLS packets to the DTLS-compliant device and have the result returned in a much larger packet to a spoofed IP address (the victim of the DDoS attack).

How many times the original package is expanded determines the amplification factor for a specific protocol. For DDoS attacks based on previous DTLS, the amplification factor was usually 4 or 5 times the original packet.

But on Monday, Hofmann reported that the implementation of DTLS on Citrix ADC devices appears to be yielding 35, making it one of the most powerful DDoS amplification vectors.

Citrix confirms problem

This morning, after several reports, Citrix also confirmed the problem and promised to release a fix after the winter break in mid-January 2020.

The company said it saw the DDoS attack vector being abused against “a small number of customers worldwide”.

The problem is considered dangerous for IT administrators, due to costs and issues related to uptime, instead of the security of their devices.

As attackers abuse a Citrix ADC device, they can end up depleting their upstream bandwidth, creating additional costs and blocking legitimate ADC activities.

Until Citrix prepared mitigations for employees, two temporary solutions emerged.

The first is to disable the Citrix ADC DTLS interface if it is not used.

If the DTLS interface is required, forcing the device to authenticate the incoming DTLS connections is recommended, although this can degrade the device’s performance.

Source