Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP
Identity

New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP

userBy userAugust 10, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 10, 2025Ravi LakshmananVulnerability/Network Security

Weaponize new attack technologies to rope thousands of public domain controllers (DCs) around the world to create malicious botnets that use them to carry out power distributed denial of service (DDOS) attacks.

This approach is codenamed Win-Ddos by Safebreach Researchers or Yair and Shahak Morag.

“When investigating the complexity of Windows LDAP client code, we discovered a critical flaw that overwhelms the URL referral process on the victim server by manipulating the point DCS.”

“The result was that we were able to create Win-Dos, which allowed attackers to leverage the power of tens of thousands of public DCs around the world to create malicious botnets with enormous resources and upload rates.

Cybersecurity

When converting DCS to a DDOS bot without the need for code execution or credentials, the attack essentially transforms the Windows platform into both a victim and a weapon. The attack flow is as follows:

The attacker sends an RPC call to the DCS, triggering it to be a CLDAP client, and sending a CLDAP request to the attacker’s CLDAP server. This will return a referral response to the attacker’s LDAP server, switching from UDP to TCP DC, and sending it to the LDAP server attacker’s attacker. A referral response containing a long list of LDAP referral URLs. All of these can point to a single port of a single IP address DCS, send an LDAP query to that port, and close the TCP connection to a web server provided through the port

“When a TCP connection is aborted, DCS continues with the next introduction on the list, which again refers to the same server,” the researcher said. “And this behavior is repeated until all URLs in the referral list have finished, creating innovative Win-DDOS attack techniques.”

What makes win-dos important is that it has high bandwidth and no need for attackers to purchase a dedicated infrastructure. Also, you cannot fly under the radar as the device must be violated.

Further analysis of the LDAP client code referral process has revealed that it is possible to trigger an LSASS crash, restart, or blue screen (BSOD) by sending a long referral list to DCS, taking advantage of the fact that it is not freed from DC’s heap memory, by taking advantage of the fact that it is not freed from DC’s heap memory.

In addition to that, transport-independent code executed on server client requests has three new denial-of-service (DOS) vulnerabilities that could cause domain controllers to crash without requiring authentication, and an additional DOS flaw that provides authenticated users with the ability to crash domain controllers or Windows computers in their domains.

Identity Security Risk Assessment

The identified drawbacks are listed below –

CVE-2025-26673 (CVSS score: 7.5) – Uncontrolled resource consumption of Windows LightWeight Directory Access Protocol (LDAP) allows unauthorized attackers to deny services on the network (fixed May 2025) CVE-2025-32724 (CVSS score: 7.5) Romantic attackers deny services over the network (fixed June 2025) CVE-2025-49716 (CVSS score: 7.5) – Windows Uncontrolled resource consumption in Netlogon allows rogue attackers to deny services on the network (fixed July 2025) CVE-2025-49722 Spooler component allows certified attackers to deny services on adjacent networks (fixed July 2025)

Similar to the vulnerability of Ldapnightmare (CVE-2024-49113), the latest findings detailed in early January of this year show that blind spots exist in windows that can be targeted, exploited and crippled business operations.

“The vulnerabilities we discovered are zero click-free vulnerabilities that allow attackers to crash these systems remotely when attackers are exposed, showing how attackers with minimal access to their internal networks can cause the same outcomes for private infrastructure,” the researchers said.

“Our findings break the general assumptions in enterprise threat modeling. DOS risks apply only to public services, and internal systems are safe from abuse unless they are fully compromised. The impact on enterprise resilience, risk modeling and defense strategies is important.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStanford is sticking to legacy admission
Next Article Automaker web portal security flaws
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.