The Domain Name System (DNS) Flooder toolkit, or DNS Flooder v1.1, uses reflection and amplification techniques. This method allows attackers to launch powerful distributed denial of service (DDoS) attacks anonymously, with just a handful of servers. This cybersecurity threat advisory provides a detailed analysis of the DNS Flooder toolkit and recommended techniques for DDoS protection and DDoS mitigation.
The DNS Flooder threat advisory includes details and DDoS mitigation for enterprises, such as:
Using the DNS Flooder toolkit, cybercriminals are purchasing and setting up their own DNS servers to orchestrate major DDoS attacks against enterprises worldwide.
This toolkit contains a new, popular method of crafting large DNS resource records.