Unfortunately, ICMP can be an attack vector for a network. A ping scan or sweep helps an attacker discover systems
to target in future attacks. ICMP tunneling
can enable a compromised device to secretly communicate with an attacker, receiving commands or exfiltrating data. An ICMP flood
, a ping of death, or a Smurf attack can shut down a network through a distributed denial of service (DDoS). Even in the cloud, common cloud misconfigurations
can open a window for ICMP-based attacks.