The DDoS Attack That Shook The World

DDoS Attack: Update 2

6 days after the DDoS attack that rocked the internet to its core, Dyn have released detailed analysis of the attack and further details have emerged. The attack has been confirmed to have been the largest of its kind in history, and the Mirai botnet has been cited as the official cause.

Dyn have estimated that there were roughly “100,000 malicious endpoints” involved in the attack, which reportedly registered a massive strength of 1.2Tbps. If these reports are found to be true, that would make this twice as strong as any other attack on record! The strongest DDoS attack prior to this also involved the Mirai botnet, in an attack on the information security blog Krebs on Security, which registered 665 Gbps.

ofer-gayerWorryingly, Ofer Gayer, a security researcher with Imperva (a DDoS mitigation provider), has suggested that the hackers could well have even more power at their disposal, “Maybe this was just a warning shot. Maybe [the hackers] knew it was enough and didn’t need their full arsenal”.

Some researchers have commented that up to 500,000 devices could have been infected through the Mirai botnet attack, so perhaps as even stronger attack is on the horizon.

Ironically, Dyn even suggested that legitimate users refreshing their browsers may have been contributing to the problem; causing the site to become even more overloaded with traffic. So next time the site is down, don’t just keep hitting refresh!

You can find the full analysis by Dyn themselves on the whole attack and aftermath here.

By Josh Hamilton

Martin Mendelsohn

Supporting CISOS, CIOS and CTOS That Are Overwhelmed During the COVID Battle

The Covid Era and CISO Stress Even before COVID-19, senior technology executives, including CISOs, CIOs and CTOs were overwhelmed, and felt an increasing lack of ballast in their lives. Some went so far as to ...
Ajay

Deep learning to avoid real time computation

Avoid real time computation “The underlying physical laws necessary for the mathematical theory of a large part of physics and the whole of chemistry are thus completely known, and the difficulty is only that the ...
Torsten

Five Ways to Secure Access to Web Workloads

Secure Access to Cloud Workloads Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. That’s a major reason why worldwide spending on public cloud services and infrastructure ...
Kyle Bernard Author

FlightHub and JustFly on Facial Recognition Technology, Travel and Privacy

Facial Recognition Technology For years facial recognition technology only existed in science books, television and cinema. The idea was brilliant. However, real-world technology hadn’t yet caught up with the concept. That’s changed in recent years ...
Kokumai

How to Enhance Security of Digital Identity

Enhance Security of Digital Identity Introduction The subject of this article is a fragile digital identity built with a weak password, which makes a grave choke point of the cyber age. The word ‘password’ is ...
Rick Braddy

The Secrets to Achieving Cloud File Storage Performance Goals

Storage Performance with Cost Reduction By 2025, according to Gartner, 80 percent of enterprises will shut down their traditional data centers. As of 2019, 10 percent have already shifted their data centers and storage to ...