http://www.theregister.co.uk/2010/08/09/dns_service_monster_ddos/ By John Leyden The Register 9th August 2010 DNS Made Easy has restored services following a vicious denial of service that peaked at 50Gbps on Saturday. The identity of the perpetrators and their motives remain unclear. One possible scenario is that hackers with a grudge against the site hired a botnet to swamp DNS Made Easy with useless traffic. A blow-by-blow account of the attack can be found via DNS Made Easy's Twitter feed here. The firm said it experienced 1.5 hours of actual downtime during the attack, which lasted eight hours. Carriers including Level3, GlobalCrossing, Tinet, Tata, and Deutsche Telekom assisted in blocking the attack, which due to its size flooded network backbones with junk. DNS Made Easy specialises in global IP Anycast enterprise DNS services, so it isn't exactly a likely target for internet attacks, especially one of such ferocity. The SANS Institute's Internet Storm Centre is among the many security watchers keen to learn more about the attack. [...] -- Visit InfoSec News! http://www.infosecnews.org/Received on Mon Aug 09 2010 - 23:14:26 PDT
This archive was generated by hypermail 2.2.0 : Mon Aug 09 2010 - 23:23:25 PDT