What is a Torshammer (Tor‘s Hammer) Attack? (2024)

A Torshammer attack is a Layer 7 Distributed Denial of Service (DDoS) attack that targets web and application servers. Torshammer initiates and executes a DDoS attack by using HTTP POST requests at a slow rate during the same HTTP session – typically between 0.5 and 3 seconds.

Anonymized DDoS attacks can also be carried out through the Tor Network using a native socks proxy integrated into Tor clients. This enables attackers to launch the attack from random source IP addresses, making the attacker nearly impossible to track.

5 Keys for Protecting Against DDoS Attacks in 2024 DDoS attacks rose 94% last year. Find out what you can do to stay secure. READ GUIDE

How does a Tor‘s Hammer DDoS attack work?

In this type of attack, the attacker floods the target application and web servers with incomplete HTTP POST requests at a slow rate. The incomplete and slow HTTP POST requests cause the web and application server connection threads to wait for request completion. The connection requests are never completed, and this causes the exhaustion of the web and application server connection handling resources. The web and application servers thus enter a denial-of-service state for processing any new connections from legitimate traffic.

How is a Tor‘s Hammer attack mitigated?

Due to the unique nature of its mechanism, the best approach to mitigate a Torshammer attack is a combination of network and application layer security.

Network filtering focuses on and blocks attackers and IP addresses known to be associated with Tor’s Hammer. Application layer security focuses on patching vulnerabilities in web applications, implementing rate limits from known malicious addresses, and the use of CAPTCHA and bot mitigation. It also uses DDoS protection services, load balancers, and web application and API protection.

Organizations can take these steps to mitigate Tor’s Hammer attacks:

  • Implement rate limiting: Rate limiting involves restricting incoming requests from any given IP address in order to prevent DDoS attacks such as those launched by HTTP Flood attackers. Note that, if anonymized, IP addresses could be spoofed which may lead to incorrect rate limits.
  • Increase web and application server connection limits: This can help reduce vulnerability to Tor’s Hammer DDoS attacks by increasing the number of concurrent HTTP connections that may be processed. Additionally, timeouts may be implemented to free up web and application server connection resources.
  • Use services such as cloud-based DDoS protection or botnet tracking: These solutions can help to identify suspicious activity quickly and respond appropriately.
  • Use load balancers and web application firewalls (WAFs): WAFs help protect against HTTP Flood attacks using HTTP GET and POST by using various mechanisms such as CAPTCHA and crypto challenges, and applying bot mitigation techniques. Load balancers and reverse proxies can buffer connections and implement multiple connection management techniques to prevent HTTP GET and POST requests from affecting applications and web server resources.
  • Always maintain Security best practices: Keep software updated and patch vulnerabilities regularly. This will help to minimize risk and protect against all types of threats, including those posed by malicious actors who use techniques like Tor’s Hammer DDoS attacks.
  • Use Radware DDoS protection (DefensePro, Cloud DDoS Protection Service), WAAP and Cloud WAAP, and Alteon (with integrated WAAP) solutions: Mitigate Tor’s Hammer DDoS attacks by using approaches that block attacks without impacting legitimate traffic and use machine-learning and behavioral-based algorithms to understand what constitutes a legitimate user behavior profile. Then, automatically block malicious attacks while managing user connections effectively without impacting legitimate HTTP requests. This increases protection accuracy while minimizing false positives and disruption to legitimate users.

DDoS attacks are on the rise in both scale and sophistication Radware can help you find the right solution for your organization. CONTACT US NOW

Related Articles

CAPTCHA CAPTCHA or ‘Completely Automated Turing test to tell Computers and Humans Apart’ was introduced as a challenge-response security test to differentiate between genuine users and bots that have a negative impact on your online business.

What is DNS Flood Attack (DNS Flooding) Domain Name System (DNS) are the directories used to resolve between machine-readable addresses of websites (such as 191.168.0.1:80) and human-readable names (e.g. radware.com)

What Is A Ping (ICMP) Flood DDOS Attack? Internet Control Message Protocol (ICMP) ping requests are used to check for connectivity and the health of networking devices.

HTTP Flood HTTP Flood is a type of Distributed Denial of Service attack method used by hackers to attack web servers and applications. HTTP floods work by directing large amounts of HTTP requests at a web page in order to overload target servers with requests.

What is a Torshammer (Tor‘s Hammer) Attack? (2024)

References

Top Articles
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 5888

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.