Skip to main content

DDoS

China Hit by the Largest DDOS Attack the Country Has Ever Seen

posted onAugust 27, 2013
by l33tdawg

Part of the Chinese Internet went down early Sunday morning in what the government is calling the largest denial-of-service attack it has ever faced.

The attack began at 2 a.m. Sunday morning and was followed by a more intense attack at 4 a.m., according to the China Internet Network Information Center, which apologized to affected users in its statement and said it is working to improve its “service capabilities.”

DoS Attack Forces EVE Online Offline

posted onJune 3, 2013
by l33tdawg

At 02:05 GMT June 2nd, CCP became aware of a significant and sustained distributed denial-of-service attack (DDoS) against the Tranquility cluster (which houses EVE Online and DUST 514) and web servers.

Our policy in such cases is to mobilize a taskforce of internal and external experts to evaluate the situation. At 03:07 GMT, that group concluded that our best course of action was to go completely offline while we put in place mitigation plans.

Spamhaus DDOS Suspect Extradited to the Netherlands

posted onMay 9, 2013
by l33tdawg

The Dutch Public Prosecution Service has announced that the man suspected of launching a distributed denial-of-service (DDOS) attack against the systems of Spamhaus has been extradited to the Netherlands.

The man, identified as 35-year-old SK, is believed to be Sven Olaf Kamphuis, aka CB3ROB, the owner of Cyberbunker. The Dutch citizen was arrested in late April near Barcelona, Spain.

According to Dutch publication WebWereld, the suspect has been jailed for 14 days. During this two-week period, the court will decide whether or not to extend the detention.

See how beautiful a DDoS attack can look

posted onApril 30, 2013
by l33tdawg

We've all heard of a distributed denial of service (DDoS) attack and know what it is: when a person or people attempt to take down a Web site by flooding it with connection requests. These max out the site's bandwidth, making it unable to accept new requests. The attacks are usually automated and can be accomplished in a variety of ways. The loss of traffic during the attack itself, and the recovery afterward, can end up costing Web sites quite a lot.

SpamHaus DDoS suspect used a van as a mobile office

posted onApril 29, 2013
by l33tdawg

The man suspected of participating in a large DDoS attack on an antispam organization that caused intermittent Internet hiccups drove around Spain in a van he used as a mobile office, Spain's Interior Ministry said Sunday.

The van was equipped with "various antennas" that were used to scan frequencies, the ministry said in a news release. On Thursday, Spanish police arrested a 35-year-old Dutch man in Barcelona suspected of conducting cyberattacks against Spamhaus, a nonprofit group that develops widely used lists of networks identified as sending spam.

ICANN weighs in on how to respond to DDoS attacks

posted onApril 26, 2013
by l33tdawg

The Internet Corporation for Assigned Names and Numbers (ICANN) has weighed in on what organisations should do if they find themselves under a distributed denial-of-service (DDoS) attack.

Its senior security technologist Dave Piscitello has prepared a basic primer for what the organisation thinks victims should do if they experience an attack, writing up his recommendations on the organisation's blog.

Fix your DNS servers or risk aiding DDoS attacks

posted onApril 2, 2013
by l33tdawg

Although this week's large-scale DDoS attack against Spamhaus may not have been as crippling as early reports suggested, they were noteworthy in that they shined spotlights on a couple of the Internet's many underlying weaknesses.

Among them are open DNS resolvers, which enable a technique called DNS amplification wherein attackers bombard target servers with as much as 100 bytes of network-clogging traffic for every one byte they send out.