All it takes is a single attempt at Googling “DVR DDoS attack” to know it’s both true and widely used, why you may ask? DVRs and camera systems require a certain port to be opened on the router to have remote access enabled, which is a port people can use to send packets in a DDoS attack.
DDoS attacks can target any open port that isn’t secured by DDoS protection, and usually due to the large amount of data that gets transferred from and to a DVR or camera system they tend to not include protection due to false positives, as DDoS protection is pretty primitive and can easily mistake gigabytes of camera feed data as a DDoS attack and either cause massive latency or entire connection drops, which obviously isn’t favourable.
So essentially, they can target the ports that are required to be open by these systems to mount an attack.
229,000 results, I dont know what you want me to do to convince you. Go write a paper about it will that convince you enough that one google search will prove you wrong, just because you dont want to prove yourself wrong doesn’t mean you should disregard over 200 thousand sources.
Even if you don’t believe the websites, it’s common sense. These systems require a port to be opened to the public which allows people to target said ports to mount an attack. That’s not a theory, that’s literally just how it works.
Even if you refuse to believe the millions of results from websites you don’t know, fully ignoring the facts behind internet security and protocol attacks is ignorant.
The moment you open a port to the public on your or your company’s router it becomes an attack vector for anyone who knows about it, and since DVRs and security camera systems are widely used by civilians and corporations alike it is an easy target, since in a lot of cases it’s guaranteed to be a possible attack vector for people with malicious intents.
That’s literally the entire premise of a DDoS attack, you target a specific port (or ports) on a specific IP and nuke it with packets of data until the system responsible for processing those requests can no longer keep up and crashes. It doesn’t matter if the port belongs to a DVR or camera system or Minecraft or Roblox server, as long as the port is open and unsecured, it’s vulnerable.
When it comes to a DVR, these are usually the ports required to be open and thus ports that can be attacked:
And as mentioned above, some of them can also be compromised when they still have a default password set and be used in a botnet to target others.
Ddosing is a huge issue, experienced it myself. Only real way to get through it is by caving into their demands (leads to them just redoing it for more) or finding something they care about and ruining that until they stop.
Yes, they can but it prevents idiots from ddosing, i myself have had this happen to me and doing the above prevented them from grabbing it because the script they were using was on auto inject, its not a 100% fix but its a bandaid
Holy this could become a critical issue if this gets out of hand. Games like adopt me are able to handle large players just fine. So whoever is able to do this must have a LOT of bots
Roblox servers use Raknet (outdated), I believe they also have recently started switching from AWS to using in-house servers. Raknet has a flaw where if you send a couple packets with the correct information it just freezes which is what these attacks do.