But let us try and find out what exactly happened that caused this attack.This is the information I gathered from various sites.
Spamhaus, an anti-spam company, placed
Cyberbunker on their black-list of spam generating companies.
Cyberbunker quickly retaliated with a Distributed Denial of Service
(DDoS) attack, which essentially is an attempt to make a machine or network resource unavailable to its intended users.Such attacks would saturate the server with communication request making it unavailable.
The initial attack failed. When the
DDoS attack failed, Cyberbunker widened the assault by exploiting a weakness in DNS. This
weakness allowed the impact of the attack to be magnified by 50 times by using decentralized cyber nodes around the
world as a means of attacking these two companies. This meant that
although only two companies were specifically targeted, the attack
jammed cyber infrastructure worldwide, causing Internet traffic to
slow across the world.
First, some background: The attacks
originally targeted a European anti-spam company called Spamhaus,
which blacklists what it considers sources of email spam and sells
those blacklists to Internet Service Providers. The attack began
early last week as waves of large but typical DDoS (Distributed Denial of Service)
assaults shortly after Spamhaus blacklisted Cyberbunker, a
controversial web hosting company. Cyberbunker has not directly taken
responsibility for the attacks against Spamhaus.
Spamhaus contracted with security firm CloudFlare to help lessen the intensity of the attacks soon after they began. CloudFlare has been defending Spamhaus by spreading the attacks across multiple data centers, a technique that can keep a website online even if it's hit by the maximum amount of traffic a typical DDoS can generate.
These attacks, have evolved into a complex and ferocious beast, pointing up to 300 gigabits per second at an expanding list of targets. How?
After the hackers realized they couldn't knock Spamhaus offline while it was protected by CloudFlare, they chose a different tactic: targeting CloudFlare's own network providers by exploiting a known fault in the Domain Name System (DNS), a key piece of Internet infrastructure.
DNS essentially turns what humans type
into an address bar ("www.mashable.com") to the desired
website's IP address and helps to deliver the desired Internet
content to a user's computer. An essential element of the DNS system
are DNS resolvers — 21.7 million of which are open and able to be
found and manipulated by hackers.
Because DNS resolvers are connected to
large pipes with plenty of bandwidth to point at a target, hackers
can manipulate them to amplify standard DDoS attacks from a maximum
of about 100 gigabits per second to the neighborhood of 300 gigabits
per second.
No comments:
Post a Comment