Why hackers choose DDoS attacks
The cyberattack that immobilized a large chunk of the internet on Friday may have seemed complex. In fact, the type attack that hackers employed to cut off access to some of the world's biggest websites was strikingly simple. The unidentified attacked used a DDoS — or "distributed denial of service" — attack, which send a huge number of requests to overwhelm servers. These attacks can take down websites or, as in Friday's case, target important systems and render them almost unusable. It's one of the oldest types of cyberattacks, but it's gained a new twist as the method has grown in scale. As the DDoS attack on domain name system (DNS) host Dyn was ongoing Friday, access to Twitter, Airbnb, Netflix, Spotify and a litany of other websites was limited. Those websites and many other rely on Dyn to connect their websites to users through the DNS system. It doesn't take particularly advanced hacking skills to block access to those sites. It just takes a huge network. "DDoS attacks are popular because in some ways, they're easy to do. If you can generate enough traffic, you can overwhelm a web server," John Graham-Cumming, chief technology officer for internet security firm Cloudflare, told Mashable. "They're sort of the simple but large way of knocking a website offline. They're not sophisticated, but they do have real impact." Friday's attack against Dyn was the second high-profile DDoS attack in recent weeks. Security blogger Brian Krebs was hit with a major DDoS attack in late September that he said at the time was the largest the internet had ever seen. The hacker collective Anonymous made headlines with a DDoS attack in 2011 that was tiny compared to Friday's, Gizmodo pointed out. The first large-scale DDoS incident was in 1999. Krebs on Friday tweeted that the firm Flashpoint had reported that day's cyberattack was launched by a botnet based off of the Miraibase code, which is used to hijack internet-connected devices and use them in DDoS attacks. A huge number of "internet of things" devices, like connected refrigerators or other smart devices, have minimal security and could easily be looped into an attack like this. "We seem to be in a bit of a season of DDoS attacks. People are using DDoS as a tool to knock things offline that they don't like," Graham-Cumming said. "I don't know the details of what Dyn is facing today, but it seems like the attacks we've seen over the past weeks and months." On late Friday afternoon, Dyn said an "advanced service monitoring issue" was resolved, but the company was still "investigating and mitigating" attacks on its infrastructure. DDoS attacks are a brute force way to take down a server. The attacks can take down particular websites or particular systems that can provide a service to numerous websites. The video below provides a visualization of what a DDoS attack looks like. In the video, a variety of bots attack a particular part of VideoLAN, a volunteer organization that makes open source software. TopicsCybersecurity
- 最近发表
-
- The Composer Has No Clothes
- Tennessee wants to make the bible its official state book.
- Sportsmen who went to war
- Unification minister promises support for humanitarian aid to North Korea despite missile launches
- Kamala Harris’ ridiculous problem with the political press.
- Bernie Sanders’ campaign second
- 市检察院送法志愿服务进村到户
- Kellyanne Conway's getting mocked for trying to diss her husband off the record
- Wordle today: The answer and hints for August 27
- Opposition floor leader denies allegations over her son's birth, nationality
- 随机阅读
-
- Abrar Ahmed returns as Pakistan names squad for second Test against Bangladesh
- UN panel allows Germany to send COVID
- North Korea leader's sister slams South Korea, US over joint military exercise
- Samsung shows off stretchable screen, and it's both awesome and weird
- We Asked GPT Some Tech Questions, Can You Tell Which Answers Are Human?
- These football fans made the cutest gesture for kids visiting from the hospital
- 我省民爆器材出厂价格实行市场调节价
- Samsung shows off stretchable screen, and it's both awesome and weird
- 50 Years Later: The Revolutionary 8008 Microprocessor
- 《雨城方言》 传承乡音
- S. Korea, US to launch defense cost
- Whose foreign policy is scarier, Ted Cruz’s or Donald Trump’s?
- Speeding space object triggered a warning. It wasn't an asteroid.
- 统筹规划齐推进 形象水平共提升
- North Korean leader visits mausoleum of late leaders to mark founding anniversary
- Suspect again denies role in Hwaseong serial murder cases
- 24 of the Oldest Trees in the World
- Yonsei professor accused of disparaging ‘comfort women’ suspended, denies allegations
- Is Andy Rubin's Essential Phone the iPhone killer we've been waiting for?
- 69 times James Blunt was laugh
- 搜索
-
- 友情链接
-