
BLOG
BLOG
One of the popular cybersecurity predictions last year was an increase in DDoS attacks. With the sharing economy's growth, we've seen an increase in the number and damage caused.
In fact, many of our customers have been asking us if DDoS attacks on mobile apps are possible. The short answer is a definite yes.
But this post is about understanding how these attacks on mobile apps work and how you can be safe.
Let's start with some basics.
A DDoS attack (Distributed Denial-of-Service attack) occurs when hackers flood a website, app, or server with overwhelming traffic, slowing it down or causing it to crash. It is like a massive traffic jam blocking all lanes on a highway, stopping legitimate users from reaching their destination.
These attacks often use a network of compromised devices (a botnet) to send a flood of fake requests, making it hard to tell real users from attackers. For CISOs, developers, and security leaders, DDoS attacks seriously threaten uptime, user trust, and business continuity.
Implementing real-time monitoring, traffic filtering, and rate limiting can help prevent these disruptions and secure applications.
Mobile apps, in general, are a threat to these dreaded attacks. In fact, mobile apps have been used to control mobile devices that are used to perform such attacks.
One reason mobile apps are susceptible to these attacks is that it is easy for an attacker to profile the user, which tremendously increases the probability of successfully performing DDoS attacks on mobile apps.
Many social and sharing apps, such as Facebook, LinkedIn, Instagram, Uber, Ola, Airbnb, etc., are susceptible to such attacks because it is easier to profile individual users through their mobile devices. Mobile application security is also often not very well-secured.
We've done a detailed report on security issues in banking apps and another on security issues in m-commerce apps. In both cases, we found that more than 80% of apps are weak in security. Remember, all these apps involve transactions and money, and the expectation for security is way higher.
Well, if we take an elementary example, imagine someone builds an app and puts it on the mobile app store, and you, as a user, download this app. This app can expose you to a DDoS attack or open up some new security loopholes on your mobile device so that it can be used for such an attack on some other server.
This means the attacker has control of your device via the app that they built and you downloaded. This way, you can either be a victim of a DDoS attack or a source. Neither is a good sign.
DDoS attacks cause much direct damage, especially to companies, since they block web traffic, reducing revenue and a high remediation cost. Additionally, there's always the threat of losing the customer's trust, which you've built over the years.
Let us take a look at some of the standard attack types when it comes to DDoS attacks:
A UDP flood can be defined as a DDoS attack that floods random ports on remote targets with UDP (User Datagram Protocol) packets. This causes the host to look for the application associated with these datagrams continuously and (when no such application is found) respond with a ‘Destination Unreachable’ packet.
This entire mechanism saps host resources and can ultimately lead to inaccessibility on the part of the user.
Based on a similar principle to the UDP flood attack, the ICMP or ping flood attack targets resources with ICMP Echo Request (ping) packets.
This attack mainly focuses on pushing packets as fast as possible without caring about replies. It affects both incoming and outgoing bandwidths.
The system further slows down as the victim’s servers respond with ICMP Echo Reply packets.
In the case of a SYN flood DDoS attack, a known vulnerability in the TCP connection sequence (the “three-way handshake”) is exploited.
In the SYN flood attack scenario, the requester sends multiple SYN requests, but none respond to the host’s SYN-ACK or dispatch the SYN requests from a spoofed IP address.
In either case, the host system waits for acknowledgment for any of the requests. This continues until no new connections can be made, ultimately resulting in the denial of service.
In the case of the Ping of Death DDoS attack, an attacker bombards a target computer with a series of contorted or malicious pings.
The general maximum length of an IP packet is around 65,535 bytes. However, the Data Link Layer on the networks poses certain limits on the size of packets. In such a scenario, these packets are further split into multiple smaller packets and later reassembled by the beneficiary host into complete packets of the required size.
However, under an attack scenario, recipients receive IP packets of larger sizes that overflow their memory buffers. This ultimately results in the denial of service for authentic packet requests.
One of the most highly dreaded DDoS attacks, Slowloris, prepares one web server to take down another target server without affecting other services or ports on the destined network.
Slowloris makes this possible by keeping multiple connections to the target web server open for as long as desired. It continuously sends multiple HTTP headers but never completes the requests. The unaware target server keeps these false connections open and waits for their completion.
This eventually results in overflowing the maximum concurrent connection pool, further denying legitimate connections from actual consumers.
In NTP amplification attacks, attackers exploit publicly accessible Network Time Protocol (NTP) servers.
In this attack, the threat actors target servers by overwhelming them with UDP traffic. This attack is generally described as amplification because its query-to-response ratio typically varies between 1:20 and 1:200 and even more.
This implies that an attacker can quickly generate a devastating high-bandwidth, high-volume DDoS attack once he obtains a list of open NTP servers (using data from the Open NTP Project or utilizing devices like Metasploit).
In an HTTP flood DDoS attack, an attacker exploits seemingly authentic HTTP POST or GET requests to attack applications and web servers. Dependence on malicious packets, web spoofing, or other reflection techniques usually doesn’t happen during an HTTP flood attack.
Moreover, less network bandwidth than other attacks is required to bring down the targeted site or server.
The attack is most dangerous when it forces the target server or application to designate the maximum resources possible in return for every single request.
Regardless of the type of attack, the threat actors' end goal is always the same: to make the target resources unresponsive and sluggish.
Let’s see how these three types of attacks usually unfold:
These attacks aim to saturate the bandwidth of the target websites or servers by overwhelming them with massive volumes of bogus traffic. ICMP floods, UDP floods, and other spoofed packet flood attacks fall into the volume-based attacks category.
Protocol or network-layer attacks consume the resources of the target infrastructure tools by sending large amounts of spoofed packets. Generally measured in PPS (Packets Per Second), these attacks include Ping of Death attacks, SYN floods, and Smurf DDoS attacks, among others.
Application layer attacks involve overwhelming applications by flooding them with malicious code requests. These requests seem legitimate only at first glance, but they eventually crash the entire web server and cause a denial of service.
These attacks involve slow, low-level attacks like POST or GET floods and generally target Windows, Apache, and OpenBSD vulnerabilities. Their size is measured in RPS (Requests Per Second).
The WireX botnet (a collection of internet-connected devices) recently caused havoc worldwide and disrupted many popular services. This was one of Android systems' first and most significant DDoS attacks. This botnet was hidden within some 300 apps that were available officially on the Google Play Store.
When users installed the app, WireX added individual mobile devices to a more extensive network, which was then used to send junk traffic to certain websites, bringing them down and making them unusable.
Google has removed roughly 300 apps from its Play Store after security researchers from several internet infrastructure companies discovered that the seemingly harmless apps—offering video players and ringtones, among other features—were secretly hijacking Android devices to provide traffic for large-scale distributed denial of service (DDoS) attacks.
Another significant attack that caught everyone's attention last year was the Mirai botnet, which crippled the Internet and brought down sites such as Amazon, Github, PayPal, Reddit, and Twitter.
Related Topic- Man in the Middle Attack ( MITM ) on Mobile Applications
Some of the standard features of DDoS attacks involving mobile devices and mobile apps are as follows:
In typical DDoS attacks, the attack duration and the attack frequency of the attack source IP address vary according to the target mobile app and device configuration.
Hackers follow a series of steps to initiate DDoS attacks involving malicious apps.
Once these techniques are followed and the users install such fraudulent apps, hackers could successfully initiate DDoS attacks targeted at desired institutions and businesses. Using deceptive ads, the owners of these malicious apps attract users to install these apps.
These fraudulent apps can control mobile devices to initiate DDoS attacks and access sensitive user data like location, bank accounts, contacts, etc. This can result in identity theft and telecommunication fraud.
So, what can you do to stop DDoS attacks?
These rules apply to all mobile users, irrespective of whether it is for personal or enterprise use. Needless to say, it's even more critical for enterprises because of the impact of the damage these attacks can cause.
Sometimes, an app might sound too good to be true. It's always good to look at it with some skepticism. Before you download the app, read some reviews, check the ratings, and even do a quick Google Search to see if there's some troubling history.
Always ensure your mobile operating system and apps are regularly updated. Manufacturers, platforms, and app developers work with security companies to identify security issues and push critical updates that solve these security bugs. You won't benefit unless you update the app.
Always search a little more for the apps you need for a particular purpose. If you see an app with bad reviews and ratings, a deeper search can help you find other apps with the same purpose but better.
Establish different layers of security in your perimeter. As an enterprise, you can use various sophisticated mobile app security solution providers to help with your security needs. As an individual user, ensure you have anti-malware apps on your mobile devices to help you detect any abnormalities.
It becomes challenging to defend security systems when many mobile devices become sources of DDoS attacks.
Following traditional methods like blacklisting and rate-limiting doesn’t help, and organizations have to come up with more innovative methods of security. Some of the measures which can help mitigate these threats are:
With the vast amount of data flowing through the sharing economy, these apps are undoubtedly a prime target for attackers—sometimes for ransom and sometimes to disrupt services or exploit the personal data of millions of users.
DDoS attacks on mobile apps are growing more sophisticated. But with the right security strategy, DevOps teams can stay ahead.
Here’s how Appknox helps safeguard your apps:
✅ Continuous security monitoring – Detect and mitigate unusual traffic patterns with real-time security intelligence.
✅ API & backend protection – Secure APIs with authentication, request validation, and rate limiting to prevent abuse.
✅ Infrastructure resilience – Leverage cloud-based protection, autoscaling, and load balancing to withstand attack surges.
✅ Application layer security – Implement Web Application Firewalls (WAF) and rate-limiting policies to block malicious requests.
✅ Automated security testing – Identify vulnerabilities before attackers do with continuous mobile app security testing from Appknox.
A proactive mobile security approach is critical to defending against evolving DDoS threats. With Appknox, you get end-to-end mobile application security to protect your apps and your users.
Sign up for a free trial now and check out Appknox in action.
We have so many ideas for new features that can help your mobile app security even more efficiently. We promise you that we wont mail bomb you, just once in a month.