The Mirai source code from the KrebsOnSecurity DDoS attack was leaked online after that attack and, not surprisingly, it appears that the Dyn DDoS attack was powered at least in part by the same Mirai code and vulnerable IoT devices, including webcams and DVRs. What was the motivation for the attack on Dyn? Retaliation for Dyn researcher Doug Madory's recent talk on DDoS attacks likely played a role, much as Brian Krebs was targeted after he reported on vDOS, a DDoS-for-hire service.
The power of recent attacks, the damage done, and the fact that such attacks can be conducted by small teams of adversaries or even determined individuals should serve as a wakeup call to enterprises everywhere. Companies often mistakenly assume that their Internet infrastructure is "too big to fail." They’ve purchased significant amounts of bandwidth, rarely coming anywhere near peak capacity, and they leverage service providers that can deliver more as needed. Yet the reality of a DDoS attack exceeding 620 Gbps, as was the case in the KrebsOnSecurity attack, is that any site would struggle to stay afloat. Bandwidth alone isn’t enough.
There are several types of attacks that are still in the DoS – “Denial of Services“ perimeter:
Network DoS
Applicative DoS
Network DDoS (including DrDOS)
Applicative DDoS
More Info: distributed denial of service attack
The power of recent attacks, the damage done, and the fact that such attacks can be conducted by small teams of adversaries or even determined individuals should serve as a wakeup call to enterprises everywhere. Companies often mistakenly assume that their Internet infrastructure is "too big to fail." They’ve purchased significant amounts of bandwidth, rarely coming anywhere near peak capacity, and they leverage service providers that can deliver more as needed. Yet the reality of a DDoS attack exceeding 620 Gbps, as was the case in the KrebsOnSecurity attack, is that any site would struggle to stay afloat. Bandwidth alone isn’t enough.
There are several types of attacks that are still in the DoS – “Denial of Services“ perimeter:
Network DoS
Applicative DoS
Network DDoS (including DrDOS)
Applicative DDoS
More Info: distributed denial of service attack
No comments:
Post a Comment