How does a Smurf attack work?
The evil creativity of malicious people doesn’t have a limit. New malware and techniques for executing attacks appear constantly, and more people experience the unfortunate consequences.
The Smurf attack is not new on the radar, but it keeps harming victims. Understanding how it works is the first step to design an efficient security strategy to protect your business.
What is a Smurf attack?
The Smurf attack belongs to the category of Distributed Denial of Service (DDoS) attacks. It was called like that due to the Smurf malware used to execute it. Its objective is to bring down computer networks, so their resources can’t be available for legit users. The vulnerability it exploits belongs to the Internet Control Message Protocol (ICMP).