• Dear Guest,

    You're browsing our forum as a Guest meaning you can only see a portion of the forum in read-only mode.
    To view all forum nodes and be able to create threads/posts please register or log-in with your existing account.

    TwinStar team

Explanation - What is happening!? (Network Engineer)

Defeated

Authorized
Joined
Apr 20, 2016
Location
New York
So many threads, so many clueless individuals. I'm here to help! I'll try to answer any questions I can without diving into too much detail. If any of this interests you, I would strongly suggest furthering your knowledge in the field of NETWORKING as there is a LARGE demand for qualified individuals. All it takes is an interest and a desire to learn. Industry leading certifications are obtainable with self-study and provide you with HIGH PAYING JOBS PEOPLE! (WORLDWIDE)


I'll start with this: THIS IS NOT BLIZZARD BEHIND THIS ATTACK.


Kronos uses Bredband2 as it's upstream provider. I'll make a reference to them in my explanation.

I believe Kronos has been the victim of an Amplified DNS DDoS attack, in fact I'm damn near certain.
I do not believe this was carried out by a Botnet.
I do believe this was done by Chinese players who were recently the victims of a ban wave.

The reason they are doing this? It has greatly effected their business/bottom dollar. They are hoping to destroy the server's population or obtain a reversal of the bans/be able to continue on with their lucrative business. Chinese in general are quite knowledgeable when it comes to circumventing/infiltrating networks. Let me explain before you all jump on the "RACIST" bandwagon. China's government owns the internet and has created a lot restrictions/censorship that it enforces (tries to) on it's citizens. As a result of China being a socialist one-party state, they want total control. When faced with limits or walls, one simply may give up or, may learn ways to circumvent said limitations. This has put a large number of individuals in China at an advantage when it comes to general knowledge of Internet, more specifically, how it works. It's human nature to want what we can't have. They are forced to learn more about said technology to obtain what's being restricted or taken from them. Now that that is out of the way, onto the explanation.

Oh, one more thing, this same situation happened to Nostalrius - but it amounted to a much different outcome.

Anyway..

Without going into too much detail, in a L3/L4 DNS Amplified DDoS attack (using a Botnet) the victims (zombies), without knowing, are sending a UDP (connectionless) request (small in size, 64byte query) to a misconfigured DNS recursor(s) (Botnet owner's choice) against a website, like.. isc.org. This specific site is commonly used in said attack due to the large DNS response one would receive from a single query.. 3,363bytes give or take. This amounts to an amplification factor of x47ish. The source address is "Spoofed" in these packets to that of the target and on a misconfigured network, one which would allow spoofing (again not going to go into too much detail here), said packet would pass through the edge router, unsuspectingly, without issue. The responses to those requests are then flooded to that target, not the initiators. Once they hit the edge router of the provider, they typically begin creating a bottleneck, which in turn brings down the network or causes SIGNIFICANT delay/latency. This effects a lot more than just this one customer that is being targeted. This pushes the provider to shut down the connection/remove the routes to the targeted address. With some basic knowledge of scripting, a single person could cause a 70-80Gbp/s spike fairly easy, 300Gbp/s with some advanced knowledge. These (70-80Gbp/s, not 300Gbp/s) DDoS attacks are GENERALLY easily mitigated (or should be at least) without issue, unless the target does not have proper mitigation in place. I have a feeling, based on my research of Bredband2, that this is what they are dealing with now. Not shitting on them, just saying.. I do not believe they have anything close to what OVH has (Nostalrius' Provider) for mitigation/prevention. The two week window for a solution, given to us from Kronos, would also lead me to believe that the provider is purchasing upgraded hardware to put inline. People asked why Nostalrius' didn't deal with this on quite the same level.. short answer being, their providers infrastructure was much better and certainly well equipped to handle such an attack.

Now with that being said, a DDoS attack of a larger magnitude, say the 300Gbp/s I mentioned.. This would be rather difficult to mitigate, regardless of hardware that is being utilized inline. CloudFlare prevented an attack of this size on one of their clients a few years ago. The explanation to how can be found not only on their website, but plastered all over the internet. TL;DR/Not detailed answer - They use their vast network to deamplify the attack by spreading it out. The attack does not "blow up" any given resource as it's being chopped up and likely dropped on it's way to the destination. Not too many of these attacks (300+Gbp/s) have surfaced. I do not believe an attack of this size is the culprit. But it is fairly straight forward to carry out.

The provider likely tried playing a game of "switch destinations/reroute traffic" with the servers (servers went up, then shortly after, brought back down) but this is child's play to someone who understands Networking. It got to the point where they couldn't be bothered with it any longer (the provider) as it was disrupting their business and now, it's just down. A mutual understanding of the situation and a solution was likely agreed upon.

Not much detail is being given to us regarding the specifics of the attacks, for good reason. But this is only one form of attack that could cause such a disruption in service.

I do not believe this is any form of Layer 7, DRDoS, Smurf or ACK Reflection (TCP) attack. I really think this is just a simple attack exposing a weakness in the providers infrastructure. Sadly, these attacks are capable of being executed simply because of poorly configured networks. If all networks were properly configured, these attacks would be near impossible to carry out.

Kronos is updating us as frequently as I would expect them to. This is not in their scope of support to deal with, this issue rests solely in the hands of their provider.

Please forgive any spelling errors/grammar.
 
Last edited:
My big complaint is that there are SOO many games to sell gold in. It happens in p2p games, b2p games, f2p games, private servers, blah blah blah. I want to know why it's such a HUGE deal for the Chinese gold sellers to get banned. I can't imagine why they would even care to DDoS a vanilla wow private server. There are an infinite number of other games and servers that they could sell gold in and make money on. I don't understand why Kronos is such a target for them and why they take even the slightest attempt at lashing out over getting banned.
 
Thanks for this! I appreciate you taking the time to type that out. Reaffirms all the snippets of info I've found elsewhere.

Now, back to Minecraft murder!
 
Cisco CCNA and CCNP Security here, you covered it pretty well.

I would only add that you shouldn't underestimate sprayed ack reflection tho, how you arrived at the conclusion it can't be it ? sprayed ack reflection can bring down even a small ISP quite easily...
 
Awesome post, thank you for taking the time to hash that out! On the topic, do you have any idea what kind of cost it is to run an attack like this as long as it has been going on?
 
My big complaint is that there are SOO many games to sell gold in. It happens in p2p games, b2p games, f2p games, private servers, blah blah blah. I want to know why it's such a HUGE deal for the Chinese gold sellers to get banned. I can't imagine why they would even care to DDoS a vanilla wow private server. There are an infinite number of other games and servers that they could sell gold in and make money on. I don't understand why Kronos is such a target for them and why they take even the slightest attempt at lashing out over getting banned.

It's rather easy for someone to carry out an attack like this - if they compromise the required resources (this is also true in the case of a Botnet attack). Piss the wrong people off and they'll find pleasure in your misery. This is fuel enough to cause such an attack.
 
I hope these money grubbing chinese gold sellers get kidnapped by their govt and disapeared.
 
From what OP writes it then looks like it can take several weeks for this problem to be solved, I will leave Kronos if this will be realised
 
Cisco CCNA and CCNP Security here, you covered it pretty well.

I would only add that you shouldn't underestimate sprayed ack reflection tho, how you arrived at the conclusion it can't be it ? sprayed ack reflection can bring down even a small ISP quite easily...

Monitoring the servers and the provider (with very limited access) over the last 48hours has provided me with enough information to rule out this type of attack. I do not want to go into too much detail, but I believe the provider has a means to circumvent this by using a "stateless" TCP connection system (SYN-Cookies). On top of this discovery, a ACK Reflection is not bandwidth consuming, but rather resource consuming.. The provider was experiencing a bandwidth issue during the attacks :biggrin:
 
My big complaint is that there are SOO many games to sell gold in. It happens in p2p games, b2p games, f2p games, private servers, blah blah blah. I want to know why it's such a HUGE deal for the Chinese gold sellers to get banned. I can't imagine why they would even care to DDoS a vanilla wow private server. There are an infinite number of other games and servers that they could sell gold in and make money on. I don't understand why Kronos is such a target for them and why they take even the slightest attempt at lashing out over getting banned.

It's unlikely that it's goldfarmers doing this. You always have to see things from their perspective and what do they gain / lose by doing this.

To prevent some people from playing a 10 year old game on a pirated server that doesnt have any cost ? Sounds unlikely, because they are rather busy farming and selling gold/currency in like 100 more mmos. Losing their accounts and then going for a childish revenge move and blowing even more of their money is not their style. And I don't think there is blackmailing to get their accounts back or any kind of this stuff they just stamp this as collateral damage and move on.

The next best and more likely culprit is Blizzard. Maybe they already tried with lawyers but can't act legal in the czech republic or Kronos simply doesn't give a shit. What would they gain ? Well, if servers are down for long enough alot of people would come back to retail out of pure addiction (Blizzard knows that like 90% of their subscribers are junkies that will play the game in whatever state it is). And let's be honest, other vanilla servers are shit, so the only option to feed is back-to-retail.
A counter argument for the blizzard theory is that this would be one of the biggest scandals in gaming history if this ever came to daylight.

Scenario 3 and by far the most likely is it's rival servers bombing Kronos, to get population over to their own Project. If the servers are really down for 2-4 weeks then at least Kronos II will be dead. People didn't invest much time yet, majority of the crowd is level 20-30, so they will just move on.

All in all you can say that this is not some kid going for a laugh but a professional attack to completely shut down the servers 24/7, so this must be a determined individual behind this.
 
Last edited by a moderator:
Instructions not clear...

dick got stuck in fan


Seriously though, the only thing the DDoSers can achieve by doing this is making players leave. So realise this and stay true to Kronos, they didn't expect the increase of players and obviously their systems weren't ready either for this scale project.

Give it time.
 
Last edited:
Awesome post, thank you for taking the time to hash that out! On the topic, do you have any idea what kind of cost it is to run an attack like this as long as it has been going on?

Cost? Nothing if a group of individuals comprised the resources needed by themselves. Once the said resources are in possession of said attackers, attacks will be accomplished for FREEEEE (minus the cost if their internet/VPN bills).
 
It's unlikely that it's goldfarmers doing this. You always have to see things from their perspective and what do they gain / lose by doing this.

Losing their accounts and then going for a childish revenge move and blowing even more of their money is not their style.

The next best and more likely culprit is Blizzard.

I edited out a lot of your post in the quote to reduce the size of mine.

This does not cost anything unless the attackers purchased compromised resources. In which case, it still wouldn't cost them very much.

It is not difficult to perform said attack. Piss off someone with the know-how and who has said resources, they wouldn't blink twice before commencing an attack. Leverage to continue their business is more than enough to cause this.

Blizzard did not do this, please stop saying this. Seriously.
 
I think its the orientals. Kronos staff has said something to the effect of 'we will not gtive in to their demands'. Ban wave happening to general tso's army. They go all kung pao chicken and start DDosing and making demands.

If this is the case: unban them and get them to stop ddosing us, meanwhile contineu working on a solution. Once the solution to the ddos attacks is in place, ban every chinese. It would be hilarious.
 
Cost? Nothing if a group of individuals comprised the resources needed by themselves. Once the said resources are in possession of said attackers, attacks will be accomplished for FREEEEE (minus the cost if their internet/VPN bills).
He's referring to opportunity cost. In the time they spend organizing and conducting the DDoS, and then monitoring the whole thing while presumably blackmailing Kronos staff, they could be selling gold in another game. These people play these games to feed their families, not for fun. And time is money.
 
Last edited:
It's unlikely that it's goldfarmers doing this. You always have to see things from their perspective and what do they gain / lose by doing this.

To prevent some people from playing a 10 year old game on a pirated server that doesnt have any cost ? Sounds unlikely, because they are rather busy farming and selling gold/currency in like 100 more mmos. Losing their accounts and then going for a childish revenge move and blowing even more of their money is not their style. And I don't think there is blackmailing to get their accounts back or any kind of this stuff they just stamp this as collateral damage and move on.

The next best and more likely culprit is Blizzard. Maybe they already tried with lawyers but can't act legal in the czech republic or Kronos simply doesn't give a shit. What would they gain ? Well, if servers are down for long enough alot of people would come back to retail out of pure addiction (Blizzard knows that like 90% of their subscribers are junkies that will play the game in whatever state it is). And let's be honest, other vanilla servers are shit, so the only option to feed is back-to-retail.
A counter argument for the blizzard theory is that this would be one of the biggest scandals in gaming history if this ever came to daylight.

Scenario 3 and by far the most likely is it's rival servers bombing Kronos, to get population over to their own Project. If the servers are really down for 2-4 weeks then at least Kronos II will be dead. People didn't invest much time yet, majority of the crowd is level 20-30, so they will just move on.

All in all you can say that this is not some kid going for a laugh but a professional attack to completely shut down the servers 24/7, so this must be a determined individual behind this.

I want what you're smoking please.
 
This attack would require open DNS servers with no packet size limit correct? I was checking some on an old list to see how easy it would be, and while some of them are still up they seem to not give large responses in UDP packet size (like over 3000bytes) and would be turned into a TCP connection. I'm guessing it's a setting on the server to limit this type of attack.
 
This attack would require open DNS servers with no packet size limit correct? I was checking some on an old list to see how easy it would be, and while some of them are still up they seem to not give large responses in UDP packet size (like over 3000bytes) and would be turned into a TCP connection. I'm guessing it's a setting on the server to limit this type of attack.

At this point in time, most of the DNS resolvers support TCP and, there are a VERY large number of DNS resolvers (~30 million) that pose a threat.

You are correct. If the response to a query (such as the one in my example) would be larger than the size allowed for a UDP packet, TCP is used. However, this does not change the parameters of the attack. UDP is used in the query because (other than the obvious) it is a connection-less protocol which requires no handshake, in turn making it easier for an attacker to spoof the source address. The transmission of the response could be UDP or TCP, doesn't really matter. As long as you have amplification in the response and a well written attack script querying the resolver.. You end up sending a lot of DATA, all at once.
 
Top Bottom