CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Thursday, April 24th 
The future of tape is here.
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

Largest DDoS Attack Ever Is Over; Used Unsecured DNS

Largest DDoS Attack Ever Is Over; Used Unsecured DNS
March 28, 2013 11:20AM

Bookmark and Share
The attackers used an amplified DNS reflection technique, in which a DNS request is sent that pretends to come from the victim site, and the unsecured DNS server responds to the site. DNS servers that have not been properly secured can amplify an incoming request, resulting in responses that could be 50 times the request, overwhelming the victim site.

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

The good news is that the largest cyberattack in history is over, and the Net is still standing. The bad news: It could happen again.

The Internet was caught in the crossfire between Spamhaus, a Europe-based non-profit that fights spam, and CyberBunker, a Dutch hosting facility. Spamhaus said it traced substantial streams of spam emanating from CyberBunker, and they put CyberBunker on a blacklist they send to e-mail services, thus resulting in millions of inboxes being blocked from those streams.

Spamhaus' efforts have been estimated to filter out an estimated 80 percent of spam, and many industry observers consider it critical to maintaining a workable global e-mail system. CyberBunker says it is "the only true independent hosting provider in the world," and it will allow customers to host anything, anonymously, except "child porn and anything related to terrorism."

'Scourge of the Internet'

CyberBunker countered the blacklisting with the largest Distributed Denial of Service (DDoS) attack in history. The attack centered on Spamhaus's DNS servers, which are deliberately spread around the globe in order to lessen any counterattack, but the downside was that the volume of the attack was so great, the spillover then clogged the Net around the world. According to Spamhaus, the attacks at their peak were about 300 gigabits per second, compared with attacks against major banks that average in the 50 Gbps range.

During the attack, Spamhaus requested help from California-based security firm CloudFlare. The attackers used an amplified DNS reflection technique, in which a DNS request is sent that pretends to come from the victim site, and the unsecured DNS responds to the site. DNS servers that have not been properly secured can amplify an incoming request, resulting in responses that could be 50 times the request. When those responses are amplified, the traffic can overwhelm the victim site.

Domain Name System computers translate the text in Web addresses into numerical IP addresses that computers use, so if a DNS server is unavailable, Web users routed to that server cannot access Web sites.

In a posting on its corporate blog last week, CloudFlare's Matthew Prince joined others who have noted that DNS servers are a vulnerable spot in the Web.

"Open DNS resolvers are quickly becoming the scourge of the Internet," Prince wrote, "and the size of these attacks will only continue to rise until all providers make a concerted effort to close them." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



 Network Security
1. Lessons from Verizon's Threat Report
2. Verizon Report Exposes Cyberthreats
3. How Are Web Sites Post-Heartbleed?
4. White House Updating Privacy Policy
5. Target Hackers May Be Tough To Find


Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Maps, Now with Time Travel
  Lessons from Verizon's Threat Report
  NYPD Twitter Campaign Backfires
  Net Gets Faster, But Easier to Attack
  OnePlus One Boasts Android Weapon

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.