{"id":35102,"date":"2020-05-21T10:52:04","date_gmt":"2020-05-21T10:52:04","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/"},"modified":"2020-05-21T10:52:04","modified_gmt":"2020-05-21T10:52:04","slug":"dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/","title":{"rendered":"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline"},"content":{"rendered":"<p>A new vulnerability has been found in the design of the world&#8217;s domain-name system that potentially can be exploited to flood websites off the internet.<\/p>\n<p>Dubbed NXNSAttack, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"http:\/\/www.nxnsattack.com\/shafir2020-nxnsattack-paper.pdf\">the flaw<\/a> [PDF] can be abused to pull off a classic amplification attack: you send a small amount of specially crafted data to a DNS server, which responds by sending a lot of data to a victim&#8217;s server. If you have an army of hacked PCs or devices \u2013 a botnet \u2013 at your command, and can find a DNS service that&#8217;s vulnerable, you can theoretically generate enough network traffic to overwhelm a victim&#8217;s system and knock it offline for all users.<\/p>\n<p>Although denial-of-service attacks are a little 1990s, blasting a business off the web can lead to a loss of sales, reputation damage, and so on.<\/p>\n<p>Lior Shafir and Yehuda Afek of Tel Aviv University, along with Anat Bremler-Barr of the Interdisciplinary Center, also in Israel, found the vulnerability which is illustrated below. APNIC, which oversees IP address allocation among other duties for the Asia-Pacific region, has a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.apnic.net\/2020\/05\/21\/nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack\/\">deep dive here<\/a>.<\/p>\n<h3 class=\"crosshead\"><span>How does it work?<\/span><\/h3>\n<p>Here&#8217;s a summary. You, as the attacker, need to set up a domain name like <code>badperson.com<\/code>. You want to take down <code>victim.com<\/code>&#8216;s DNS servers. You connect to a recursive DNS server on the internet \u2013 such as one provided by your ISP or a cloud platform \u2013 and you ask it to resolve, say, <code>i.am.a.badperson.com<\/code> into an IP address. The recursive server contacts your DNS server for your dot.com for that information.<\/p>\n<p>Your name server tells the recursive server it needs to look up <code>another.victim.com<\/code>, <code>sad.victim.com<\/code>, <code>tragic.victim.com<\/code>, <code>fashion.victim.com<\/code>, and so on, to get the answer it seeks. This message neglects to include any glue records containing IP addresses. So the recursive server \u2013 key word recursive \u2013 connects to the DNS server for <code>victim.com<\/code> and asks for the records on all those sub-domains, and the <code>victim.com<\/code> DNS server replies with error messages for the non-existent sub-domains.<\/p>\n<p>As you can see, you&#8217;ve turned that one request into a small storm of data exchanged between the recursive and the <code>victim.com<\/code> name servers. If you get a botnet to do this many times a second or minute, you can flood both of those name servers with packets, preventing legit look-ups from getting through from netizens, and the systems will appear down. According to the academics, you can perform double amplification of network traffic by extending the attack recursively. If the servers start to cache their look ups, and do not send any further packets, simply specify new and unique sub-domains.<\/p>\n<div class=\"CaptionedImage width_85\" readability=\"7\"><a href=\"https:\/\/regmedia.co.uk\/2020\/05\/21\/nxns_attack.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/05\/21\/nxns_attack.png?x=648&amp;y=437&amp;infer_y=1\" alt=\"Illustration of the NXNS Attack (Shafir et al)\" title=\"Illustration of the NXNS Attack (Shafir et al)\" height=\"437\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">An illustration of the NXNSAttack<br \/>Click to enlarge. Credit: Shafir et al<\/p>\n<\/div>\n<p>In more technical terms, here is how the boffins explained it:<\/p>\n<p>We&#8217;re told NXNSAttack can be exploited to force the transmission of as many as 1,620 times the expected number of packets from a single request. In reality, it was shown, for example, that Google DNS could be used to generate 30 times the expected packets; 48 times from Cloudflare, 204 times from Oracle&#8217;s Dyn; 415 times from IBM&#8217;s Quad9; and 569 times from Norton ConnectSafe.<\/p>\n<p>The danger is severe enough that it got the attention of Microsoft. As the team&#8217;s research went public this week, the Windows giant issued <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV200009\">an advisory<\/a> on the matter for its DNS software.<\/p>\n<p>&#8220;Microsoft is aware of a vulnerability involving packet amplification that affects Windows DNS servers,&#8221; the memo stated. &#8220;An attacker who successfully exploited this vulnerability could cause the DNS Server service to become non-responsive.&#8221;<\/p>\n<p>The flaw is not limited to Windows servers; it&#8217;s just that Microsoft isn&#8217;t in the business of posting advisories for other platforms.<\/p>\n<p>To mitigate the problem, the researchers suggest name servers implement an algorithm they devised dubbed Max1Fetch that reduces the storm of traffic between the DNS components involved.<\/p>\n<p>The trio said they responsibly disclosed the hole well in advance of <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/arxiv.org\/abs\/2005.09107\">going public<\/a>, and various DNS software makers have already patched, or are in the process of patching, the vulnerability \u2013 at least some of which using the Max1Fetch method. We&#8217;re told the following software suppliers and service providers have fixed up their vulnerable DNS server software:<\/p>\n<p>You should check for updates for your DNS server installation, and install them to avoid being blown over by a distributed denial-of-service attack. &#8220;If you operate your own DNS resolver, no matter what brand it is, please upgrade to the latest version now,&#8221; APNIC urged. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1946\/-8720\/how-to-simplify-data-protection-on-amazon-web-services?td=wptl1946\">How to simplify data protection on Amazon Web Services<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/05\/21\/nxnaattack_bug_disclosed\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft, BIND, Google, Cloudflare, Amazon, others fix up software A new vulnerability has been found in the design of the world&#8217;s domain-name system that potentially can be exploited to flood websites off the internet.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35103,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-35102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-21T10:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"437\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline\",\"datePublished\":\"2020-05-21T10:52:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/\"},\"wordCount\":763,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/\",\"name\":\"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png\",\"datePublished\":\"2020-05-21T10:52:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png\",\"width\":648,\"height\":437},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/","og_locale":"en_US","og_type":"article","og_title":"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-21T10:52:04+00:00","og_image":[{"width":648,"height":437,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline","datePublished":"2020-05-21T10:52:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/"},"wordCount":763,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/","url":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/","name":"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png","datePublished":"2020-05-21T10:52:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline.png","width":648,"height":437},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/dns-this-week-stands-for-drowning-needed-services-design-flaw-in-name-server-system-can-be-exploited-to-flood-machines-offline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS this week stands for Drowning Needed Services: Design flaw in name server system can be exploited to flood machines offline"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35102"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35103"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}