Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
World Wide Web
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Largest DDoS Attack Ever Is Over; Used Unsecured DNS
Largest DDoS Attack Ever Is Over; Used Unsecured DNS

By Barry Levine
March 28, 2013 11:20AM

    Bookmark and Share
The attackers used an amplified DNS reflection technique, in which a DNS request is sent that pretends to come from the victim site, and the unsecured DNS server responds to the site. DNS servers that have not been properly secured can amplify an incoming request, resulting in responses that could be 50 times the request, overwhelming the victim site.
 



The good news is that the largest cyberattack in history is over, and the Net is still standing. The bad news: It could happen again.

The Internet was caught in the crossfire between Spamhaus, a Europe-based non-profit that fights spam, and CyberBunker, a Dutch hosting facility. Spamhaus said it traced substantial streams of spam emanating from CyberBunker, and they put CyberBunker on a blacklist they send to e-mail services, thus resulting in millions of inboxes being blocked from those streams.

Spamhaus' efforts have been estimated to filter out an estimated 80 percent of spam, and many industry observers consider it critical to maintaining a workable global e-mail system. CyberBunker says it is "the only true independent hosting provider in the world," and it will allow customers to host anything, anonymously, except "child porn and anything related to terrorism."

'Scourge of the Internet'

CyberBunker countered the blacklisting with the largest Distributed Denial of Service (DDoS) attack in history. The attack centered on Spamhaus's DNS servers, which are deliberately spread around the globe in order to lessen any counterattack, but the downside was that the volume of the attack was so great, the spillover then clogged the Net around the world. According to Spamhaus, the attacks at their peak were about 300 gigabits per second, compared with attacks against major banks that average in the 50 Gbps range.

During the attack, Spamhaus requested help from California-based security firm CloudFlare. The attackers used an amplified DNS reflection technique, in which a DNS request is sent that pretends to come from the victim site, and the unsecured DNS responds to the site. DNS servers that have not been properly secured can amplify an incoming request, resulting in responses that could be 50 times the request. When those responses are amplified, the traffic can overwhelm the victim site.

Domain Name System computers translate the text in Web addresses into numerical IP addresses that computers use, so if a DNS server is unavailable, Web users routed to that server cannot access Web sites.

In a posting on its corporate blog last week, CloudFlare's Matthew Prince joined others who have noted that DNS servers are a vulnerable spot in the Web.

"Open DNS resolvers are quickly becoming the scourge of the Internet," Prince wrote, "and the size of these attacks will only continue to rise until all providers make a concerted effort to close them." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 World Wide Web
1.   Facebook To Force Use of Messenger
2.   OkCupid Experiments with Daters
3.   Zillow Buys Trulia for $3.5 Billion
4.   Competition Spurs Ultra-Fast Internet
5.   Google Buys Streaming Site Twitch


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 

Mobile Technology Spotlight
Android 'Fake ID' Puts Millions of Users at Risk
Having this fake ID is nothing to brag about, even if you are a minor. The “Fake ID” Android flaw drops malware into smartphone apps. It can steal credit card data and even take over your device.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.