The DDoS Attack That Shook The World

DDoS Attack: Update 2

6 days after the DDoS attack that rocked the internet to its core, Dyn have released detailed analysis of the attack and further details have emerged. The attack has been confirmed to have been the largest of its kind in history, and the Mirai botnet has been cited as the official cause.

Dyn have estimated that there were roughly “100,000 malicious endpoints” involved in the attack, which reportedly registered a massive strength of 1.2Tbps. If these reports are found to be true, that would make this twice as strong as any other attack on record! The strongest DDoS attack prior to this also involved the Mirai botnet, in an attack on the information security blog Krebs on Security, which registered 665 Gbps.

ofer-gayerWorryingly, Ofer Gayer, a security researcher with Imperva (a DDoS mitigation provider), has suggested that the hackers could well have even more power at their disposal, “Maybe this was just a warning shot. Maybe [the hackers] knew it was enough and didn’t need their full arsenal”.

Some researchers have commented that up to 500,000 devices could have been infected through the Mirai botnet attack, so perhaps as even stronger attack is on the horizon.

Ironically, Dyn even suggested that legitimate users refreshing their browsers may have been contributing to the problem; causing the site to become even more overloaded with traffic. So next time the site is down, don’t just keep hitting refresh!

You can find the full analysis by Dyn themselves on the whole attack and aftermath here.

By Josh Hamilton

Cloud Image Migration
Effective Cloud Migration Monitoring The global pandemic witnessed the digital transformation of businesses in the cloud.  Today, even as the world resumes to normal, the end-to-end innovation in business strategies has kept the momentum going ...
James Corbishly
Teams Sprawl in the Remote Workspace As working from home has become the new everyday norm, with more employers embracing the remote-work model as a new and likely permanent fixture of the employment world, there ...
Gary Bernstein
Using Data to Gain Advantages Data collection is now omnipresent in every sector of the global economy. Several aspects of modern economic activity would not be possible without it, just as it would not be ...
Gary Bernstein
Test Data Management How do you test your data management systems? With Delphix, you can automate your tests by running your data against a virtual copy of your production environment. Today, the amount of data ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.