DDoS Attacks on Game Servers
The hacking collective PoodleCorp has committed to launch a DDoS attack in an attempt to ruin the launch of Battlefield 1.
Download a Copy Now
Largescale DDoS attacks on game servers have become an everyday occurrence in the gaming industry. Gaming companies are suffering network outages and service degradation causing immediate impact on their brand equity. Case in point: the hacking collective PoodleCorp has committed to launch attacks on Battlefield 1 game servers in an attempt to ruin the launch of Battlefield 1 on October 21, 2016.
Figure 1: PoodleCorp Launches attack against Blizzard
There are many reasons this industry is targeted and this alert analyzes a number of these recent incidents as they are becoming more persistent (see Figure 2). The high volume of these DDoS attacks on game servers not only targets the vendors themselves, but can impact network providers who must contend with potential Internet pipe saturation. Gamers, many of whom are paying customers, remain frustrated.
Figure 2: Blizzard admits being hit by a DDoS attack in August
Hacking and DDoS attacks on game servers have always been a part of the gaming culture, but recently Radware has documented a dramatic evolution in the DoS attacks directed at the gaming industry. No longer a mere showcase of power, the motivations behind the DDoS attacks on game servers are becoming more sinister in nature.
Riot Games, EA and Blizzard have all suffered from massive attacks from two DDoS groups, Lizard Squad and PoodleCorp. Since April 2016, Blizzard has experienced over 12 network crippling attacks that have left their user base unable to play their games (see Figure 3).
Figure 3: LizardSquad Shenron Stresser Panel, used to launch April attacks against Blizzard
There are numerous reasons for DDoS attacks on game servers, however most can be categorized under the following three categories:
- Trolling – These assaults come at crucial moments when gamers are trying to take advantage of game specials and bonus points. These events have set start and finish dates. When attackers cripple the network during these times, gamers can become upset and take to social media to voice their frustration. By upsetting the users in a critical moment, hackers can harm the reputation of the company.
- Retaliation – Recently, Blizzard banned a large group of users for using automatic triggering and aim bots. In response, these users with the assistance of Lizard Squad, where able to retaliate against the company with a massive DDoS attack.
- Thrill and Attention – These attacks are focused mainly on tournament disruption, booting specific players, stunt DDoS'ing, advertisement (self-promotion)
Figure 4 & 5 – Poodlecorp harasses Electronic Arts
Reasons for Concern
Attacks continue to increase in size. By combining multiple botnets and stresser services in joint operations, these mega attacks are bound to cause severe damage not only to the gaming operators and their players, but to the network infrastructure providers as well – who will have to absorb (or scrub) these mega DDoS attacks. This disruption ultimately leads to high latency service degradation impacting additional enterprise customers as it consumes the service provider’s resources (see Figure 6). Often times, attackers will aim their attacks directly at an ISP with a PoP near the gaming operator to disrupt traffic.
Figure 6: During these attack legitimate users find themselves being blocked
Botnet - A collection of compromised computers often referred to as "zombies" infected with malware that allows an attacker to control them using a command and control server. Botnet owners or "herders" control their botnet by means of a covert channel such as IRC (Internet Relay Chat), issuing commands to perform malicious activities such a DDoS attack, sending spam, and steal information.
How to Prepare
- Improve resilience
- Adopt a threat intelligence process
- Encourage information sharing
- Consider a cloud scrubbing service with a high mitigation capacity (looking ahead – at least 2TB)
Effective DDoS Protection Considerations for Organizations Under Threat
- A hybrid solution combining on-premises detection and mitigation with cloud-based protection for volumetric attacks. It facilitates quick detection, immediate DDoS mitigation and prevents Internet pipe saturation.
- Maintaining service availability under attack by choosing a DDoS protection solution that monitors traffic behavior and distinguishes between legitimate users and attack traffic, allowing them in while blocking the malicious packets
- An integrated, synchronized solution that can protect from multi-vector attacks such as network floods, and application layer attacks such as low-and-slow service disruptions or HTTP/S floods.
- A cyber-security emergency response plan that includes a dedicated emergency team of experts and clear actions in the event of attack.
Radware recommends IT crews to monitor security alerts and examine triggers carefully. Tune existing policies and protections to prevent false positives and allow identification of real threats when they occur.
Under Attack and in Need of Expert Emergency Assistance? Radware Can Help.
Radware offers a DDoS service to help respond to security emergencies, neutralize the risk and better safeguard operations before irreparable damages occur. If you’re under DDoS attack or malware outbreak and in need of emergency DDoS prevention assistance, Contact us with the code "Red Button".