Websites are falling down; the Verge, Twitter, Paypal, Github, soundcloudn Reddit, Netflix, Amazon and many others are inaccessible, some rumors say it’s the biggest Distributed Denial of Service (DDoS) attack ever made, yet, hackers prove (again) that nothing is 100% safe.
DDoS ? What exactly happened ?
Well, things still blurry for now, but what we know is that the target was Dyn; one of the biggest DNS providers in the world, the exact details of the attack remain vague, but Dyn reported a huge army of hijacked internet-connected devices could be responsible for the massive attack.
The method used is the same used recently against the France-based web hosting provider OVH, we are talking about 1 Tbps of traffic ! maybe even more.
1 Tbps…Wot…How ?!
I personally believe it’s a botnet who caused this massive traffic, botnet is a distributed malware affecting millions of devices across the world, making IoT devices as a primary target, These devices are implemented in a way that they cannot easily be updated and thus are nearly impossible to secure, infected devices (also called zombies) are usually sleeping and waiting for orders from a Command & Control Server, you can imagine what may happen if all devices are connected at the same time to the same server and sending billions of requests per second, if you own an IoT device, maybe you were a part of this attack too!
So the formula is really simple, instead of targeting a single website, why not targeting the DNS provider, so users won’t be able to access the DNS address leading to the website.
FBI and the US Department of Homeland Security (DHS) are investigating the huge DDoS attack, I’ll keep this article updated as I can’t hide my excitement and curiosity to know more about the group behind this attack.
“New World Hackers” group was behind the attack, 100.000 IoT device has been used in order to make Dyn offline.
Latest posts by AYOUB BAHAR (see all)
- ISIM REST API Samples - July 10, 2019
- IBM DB2 HADR: Dummy guide - April 13, 2019
- Integrate IBM Security Directory Server with QRadar (and any other SIEM) - March 25, 2019