Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP

Stanford is sticking to legacy admission

Researcher Details Window EPM Addiction Exploit Chain Domain Privileges

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP
Identity

New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP

userBy userAugust 10, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 10, 2025Ravi LakshmananVulnerability/Network Security

Weaponize new attack technologies to rope thousands of public domain controllers (DCs) around the world to create malicious botnets that use them to carry out power distributed denial of service (DDOS) attacks.

This approach is codenamed Win-Ddos by Safebreach Researchers or Yair and Shahak Morag.

“When investigating the complexity of Windows LDAP client code, we discovered a critical flaw that overwhelms the URL referral process on the victim server by manipulating the point DCS.”

“The result was that we were able to create Win-Dos, which allowed attackers to leverage the power of tens of thousands of public DCs around the world to create malicious botnets with enormous resources and upload rates.

Cybersecurity

When converting DCS to a DDOS bot without the need for code execution or credentials, the attack essentially transforms the Windows platform into both a victim and a weapon. The attack flow is as follows:

The attacker sends an RPC call to the DCS, triggering it to be a CLDAP client, and sending a CLDAP request to the attacker’s CLDAP server. This will return a referral response to the attacker’s LDAP server, switching from UDP to TCP DC, and sending it to the LDAP server attacker’s attacker. A referral response containing a long list of LDAP referral URLs. All of these can point to a single port of a single IP address DCS, send an LDAP query to that port, and close the TCP connection to a web server provided through the port

“When a TCP connection is aborted, DCS continues with the next introduction on the list, which again refers to the same server,” the researcher said. “And this behavior is repeated until all URLs in the referral list have finished, creating innovative Win-DDOS attack techniques.”

What makes win-dos important is that it has high bandwidth and no need for attackers to purchase a dedicated infrastructure. Also, you cannot fly under the radar as the device must be violated.

Further analysis of the LDAP client code referral process has revealed that it is possible to trigger an LSASS crash, restart, or blue screen (BSOD) by sending a long referral list to DCS, taking advantage of the fact that it is not freed from DC’s heap memory, by taking advantage of the fact that it is not freed from DC’s heap memory.

In addition to that, transport-independent code executed on server client requests has three new denial-of-service (DOS) vulnerabilities that could cause domain controllers to crash without requiring authentication, and an additional DOS flaw that provides authenticated users with the ability to crash domain controllers or Windows computers in their domains.

Identity Security Risk Assessment

The identified drawbacks are listed below –

CVE-2025-26673 (CVSS score: 7.5) – Uncontrolled resource consumption of Windows LightWeight Directory Access Protocol (LDAP) allows unauthorized attackers to deny services on the network (fixed May 2025) CVE-2025-32724 (CVSS score: 7.5) Romantic attackers deny services over the network (fixed June 2025) CVE-2025-49716 (CVSS score: 7.5) – Windows Uncontrolled resource consumption in Netlogon allows rogue attackers to deny services on the network (fixed July 2025) CVE-2025-49722 Spooler component allows certified attackers to deny services on adjacent networks (fixed July 2025)

Similar to the vulnerability of Ldapnightmare (CVE-2024-49113), the latest findings detailed in early January of this year show that blind spots exist in windows that can be targeted, exploited and crippled business operations.

“The vulnerabilities we discovered are zero click-free vulnerabilities that allow attackers to crash these systems remotely when attackers are exposed, showing how attackers with minimal access to their internal networks can cause the same outcomes for private infrastructure,” the researchers said.

“Our findings break the general assumptions in enterprise threat modeling. DOS risks apply only to public services, and internal systems are safe from abuse unless they are fully compromised. The impact on enterprise resilience, risk modeling and defense strategies is important.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStanford is sticking to legacy admission
user
  • Website

Related Posts

Researcher Details Window EPM Addiction Exploit Chain Domain Privileges

August 10, 2025

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

August 9, 2025

Researchers reveal Revault Attack targeting Dell ControlVault3 firmware on over 100 laptop models

August 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP

Stanford is sticking to legacy admission

Researcher Details Window EPM Addiction Exploit Chain Domain Privileges

After researchers masked prolific SMS scammers, new operations emerged as a result

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.