Kæmpe DDoS angreb på "Dyn"
|
21-10-2016, 23:49
(Denne besked var sidst ændret: 21-10-2016, 23:51 af Spin.)
|
|||
|
|||
Kæmpe DDoS angreb på "Dyn"
<TechCrunch[/font Skrev:[font=Monaco, Consolas, Courier, monospace]>]Several waves of major cyberattacks against an internet directory service knocked dozens of popular websites offline today, with outages continuing into the afternoon. Twitter, SoundCloud, Spotify, Shopify, and other websites have been inaccessible to many users throughout the day. The outages are the result of several distributed denial of service (DDoS) attacks on the DNS provider Dyn, the company confirmed. The outages were first reported on Hacker News. “We are actively in the third flank of this attack,” Dyn’s chief strategy officer Kyle Owen told reporters around 4:30 p.m. ET today. “It’s a very smart attack. As we mitigate, they react.” Dyn’s general counsel Dave Allen added that, with the help of other infrastructure companies Akamai and Flashpoint, Dyn has determined that some of the traffic used in the attacks comes from the Mirai botnet, a network of infected Internet of Things devices used in other recent large-scale DDoS attacks. Dyn and other DNS providers operate as a link between the URLs you type into your browser and the corresponding IP addresses. DDoS attacks are frequently used to censor specific websites by overwhelming them with junk traffic and knocking them offline. However, by attacking Dyn, it’s possible to overwhelm that directory function and cause outages and loading problems across a large swath of the internet. Other sites experiencing issues include Box, Boston Globe, New York Times, Github, Airbnb, Reddit, Freshbooks, Heroku and Vox Media properties. Users in Europe and Asia may experience fewer problems than those in the U.S. — according to DownDectector’s outage map, the DDoS attacks against Dyn are primarily impacting U.S. users. https://techcrunch.com/2016/10/21/many-s...ng-outage/ Godt nok noget af et angreb der har fundet sted i dag. Jeg kan stadig ikke komme på Shopify. (Indlæg nr 1.234) ![]()
Kan du formulere dig godt på skrift?
Er du villig til at lære om en masse nye emner? Er du klar på at tjene meget lette penge? Skriv en besked til mig på SS. |
|||
22-10-2016, 02:05
|
|||
|
|||
RE: Kæmpe DDoS angreb på "Dyn"
Jeg kunne heller ikke forstå hvorfor jeg ikke kunne komme ind på Shopify
Tak for share :) spændende artikel
---------------
☁CL0UDY☁ |
|||
22-10-2016, 13:06
|
|||
|
|||
RE: Kæmpe DDoS angreb på "Dyn"
Det er rimelig interessant at bemærke, at langt de fleste inficerede IoT devices som er brugt til angrebet, stammer i sidste ende fra samme producent.
https://krebsonsecurity.com/2016/10/hack...et-outage/ Jeg tror ikke det bunder i noget ondsindet fra det kinesiske firma "XiongMai Technologies", som nogen ellers antyder, jeg tror måske mere det bare bunder i super dårlig sikkerhedshåndtering.
---
God, root, what is difference? [ The TN3270 Warrior ] If you are worthy, you know where to find me... |
|||
24-10-2016, 15:08
|
|||
|
|||
RE: Kæmpe DDoS angreb på "Dyn"
Vi kommer vel kun til at se flere af denne slags iot ddos fremover, det er jo en utrolig smart måde at gøre det på, da sikkerheden på det område halter latterligt og der kommer mere og mere iot.
|
|||
25-10-2016, 11:49
|
|||
|
|||
RE: Kæmpe DDoS angreb på "Dyn"
(22-10-2016, 13:06)UID0 Skrev: Det er rimelig interessant at bemærke, at langt de fleste inficerede IoT devices som er brugt til angrebet, stammer i sidste ende fra samme producent.Det er fandme genialt. Har godt set en defcon talk omkring CCTV's, og hvordan mange af dem nærmest ikke har nogen form for sikkerhed overhovedet. At lave et angreb på den måde, må man alligevel tage hatten af for. |
|||
25-10-2016, 15:11
|
|||
|
|||
RE: Kæmpe DDoS angreb på "Dyn"
(24-10-2016, 15:08)mirato Skrev: Vi kommer vel kun til at se flere af denne slags iot ddos fremover, det er jo en utrolig smart måde at gøre det på, da sikkerheden på det område halter latterligt og der kommer mere og mere iot. Med nogle af de 0-days jeg ligger inde med, er der i hvert fald tæt på 500.000 internetopkoblede og aktive enheder, ifølge Shodan. Lige til at masseinficere. Men man skal nok have fat i Nmap eller Masscan for at få et mere præcist billede, udelukkende med online enheder, før de har en chance for at skifte IP. |
|||
25-10-2016, 20:50
|
|||
|
|||
RE: Kæmpe DDoS angreb på "Dyn"
Jeg kan finde ca. 30.000 på shodan med mulighed for shell cmd som root i browseren på en søgning.
There was an important job to be done and Everybody was sure that Somebody would do it. Anybody could have done it, but Nobody did it. Somebody got angry about that, because it was Everybody's job. Everybody thought Anybody could do it, but Nobody realized that Everybody wouldn't do it. It ended up that Everybody blamed Somebody when Nobody did what Anybody could have done |
|||
|
User(s) browsing this thread: 1 Gæst(er)