How Threat Actors Are Using ScareCrow to Bypass EDR Tools
As technology progresses, defensive as well as offensive measures for security constantly evolve. Security researchers consistently find new ways to exploit...
Find flaws in web, mobile, and IoT applications.
Expose risks in AWS, Azure, and GCP environments.
Ongoing testing to catch real-world vulnerabilities as they appear.
Live-fire exercises to sharpen detection and response.
Time-boxed security assessments across networks, apps, and infrastructure.
Simulated attacks to test detection and incident response.
Named security experts integrated seamlessly into your team.
Real-time detection and automated threat response.
24x7 monitoring and response by expert analysts.
Nonstop scanning to prioritize and reduce risk.
Ongoing scanning, triage, and compliance tracking.
Unified security platform powering all UV services.
Cross-platform toolkit for advanced red team ops.
Secure your code, infrastructure, and deployment pipelines before attackers exploit them.
September 19, 2025
August 27, 2025
June 26, 2025
UltraViolet Cyber is a practitioner-led MSSP delivering offensive and defensive security to Global 2000 and Federal clients. Built by former intelligence operators, we unify application security, red teaming, detection, and engineering under one roof. Our UV Lens platform replaces silos with integrated, outcome-driven operations.
UltraViolet Cyber
The ‘Loop DoS’ attack generally follows this pattern: a threat actor identifies two DNS resolvers with a configuration which causes the servers to respond to messages with an error message of their own. The threat actor then sends a specifically crafted error message with a resolve answer included. This will tell DNS resolver A to send error messages back to resolver B. Resolver B will then respond to the error message with an error message of its own and send that back to resolver A. This will continue in a loop until the resolvers crash or network administrators notice the traffic and work to resolve the feedback loop. Because this attack vector can be stacked, many loops may be active at the same time. This could theoretically take up all available sockets and block any legitimate incoming traffic, triggering a denial of service (DoS) attack.
The details of the attack have not yet been published, as the attack vector has not yet been observed in the wild. However, monitoring network traffic for increases in overall volume, with particular attention for modern UDP application-layer protocols 'TFTP', 'DNS' and 'NTP', and legacy UDP protocols 'QOTD/RFC865', 'Chargen/RFC864', 'Echo/RFC862', 'Time', 'Daytime' and 'Active Users', may help identify this attack. The listed legacy protocols have this vulnerability included by design.
These application-layer loops are different from normal misconfiguration issues from network-layer loops. Time-to-live hop limits in IP detections would not mitigate the application-layer specific attack. While all attributes related to this vulnerability have not yet been researched, a common trend appears to relate some of the vulnerability to pre-2010 versions of ntpd.
Disclosures to affected vendors and developers of products vulnerable to this new attack will be sent out over time. Shadowserver sent a report related to these vulnerable services to organizations already subscribed to their service back on December 20, 2023. Regular organizations can protect themselves against this attack vector by ensuring their web-facing services are behind a firewall and that affected services and their ports are reassigned to ephemeral ports rather than the standard ports. When the error messages are sent to ephemeral ports instead, the loop cannot occur anymore.
CISPA (2024, March 19). Loop DoS: New Denial-of-Service attack targets application-layer protocols.
Retrieved March 29, 2024, from https://cispa.de/en/loop-dos
Dogan, N. (2024, January 7). Discovering Network Loops (Layer 2) with Wireshark. Retrieved March 29,
2024, from https://www.golinuxcloud.com/
Rossow, C., & Pan, Y. (2024, March 26). Advisory on Application-layer Loop DoS Attacks. Google Docs.
Retrieved March 29, 2024, from https://docs.google.com/document/d/
Toonk, A. (2024, March 13). The Risks and Dangers of Amplified Routing Loops. Retrieved March 29,
2024, from https://toonk.io/the-risks-and-dangers-of-amplified-routing-loops/index.html
We’re here to help. Get in touch for an initial conversation with one of our security experts and learn more about how UltraViolet Cyber can help you take cyber readiness and resilience to new levels.