In Internet-based computer-networking, a Twinge attack is a flood of false ICMP packets in an attempt to cripple a system.
[1] The attack is spoofed, that is, random fake Internet source addresses are used in the ICMP packets.
The attacking program is called Twinge, but the ICMP packets have a particular signature which gives the identity away.
[clarification needed] As long as the computer is safely behind a router or a firewall, there is nothing to worry about with this attack.
[2] Configuring upstream network devices (including firewalls and routers) to ignore ICMP packets from the public Internet will make this almost certainly not succeed.