Reflection Amplification (T1498.002)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Impact

Impact (TA0040)

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View on ATT&CK

Procedure Examples

Description Source(s)
Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019. Cisco DoSdetectNetflow
Cloudflare. (n.d.). What is a DNS amplification attack?. Retrieved April 23, 2019. Cloudflare DNSamplficationDoS
Cloudflare. (n.d.). What is a NTP amplificaiton attack?. Retrieved April 23, 2019. Cloudflare NTPamplifciationDoS
Marek Majkowsk, Cloudflare. (2017, May 24). Reflections on reflection (attacks). Retrieved April 23, 2019. Cloudflare ReflectionDoS May 2017
Marek Majkowski of Cloudflare. (2018, February 27). Memcrashed - Major amplification attacks from UDP port 11211. Retrieved April 18, 2019. Cloudflare Memcrashed Feb 2018
Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019. Arbor AnnualDoSreport Jan 2018