Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Takin' names and kickin' ASCII.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » March 2013 » Large-scale DNS DDoS attack on Spamhaus

Large-scale DNS DDoS attack on Spamhaus


Contributed by: Email on 03/27/2013 03:52 PM [ comments Comments ]


Almost unnoticed by the public, the most aggressive DDoS (Distributed Denial of Service) attack in the history of the internet was carried out last week. At least this is what the New York Times reports, referring to statements made by a high-ranking member of staff at content distribution provider Akamai. The attack targeted the Spamhaus anti-spam organization.

Apparently, Spamhaus seriously trod on various spammers' toes before the attack. The organization had added IP address blocks belonging to Cyberbunker, a Dutch hosting service that is considered to be spammer friendly, to its blacklist. As almost 80 per cent of anti-spam filters use this blacklist and consequently began to block Cyberbunker, customers of the hosting service suddenly found themselves almost unable to send out any emails.

Shortly afterwards, on 19 March, an initially moderate, but then greatly intensifying DDoS attack was unleashed on the Spamhaus web servers. According to Akamai, the attack's data stream reached up to 300 GBits/s at peak times. Only a few hours after the attack began, Spamhaus commissioned security company Cloudflare to mitigate the attack. In a blog post (and later follow-up post) Cloudflare CEO Matthew Prince describes how the attack progressed and analyses the attackers' techniques.

According to Prince, the majority of junk traffic was generated using a DNS amplification attack or DNS reflection attack. This well known method relies on the fact that there are thousands of open DNS servers worldwide that will respond to any request without performing any checks. The attackers send requests with their victim's spoofed IP address to these "open resolvers" – then the responses arrive on the victim's system.

In the current case, each request was about 36 bytes long and requested a DNS zone file of around 3,000 bytes. Therefore, the DNS servers amplified each request by a factor of almost 100. Prince explained that Cloudflare registered at least 30,000 requesting DNS servers. According to the CEO, the attackers only needed 750 MBits/s of outgoing bandwidth to generate an average traffic load of 75 GBits/s for their victim. Only "a small sized botnet" was therefore needed to knock the Spamhaus web site offline, added Prince.

The Cloudflare executive didn't hesitate to compare the DNS reflection technique to a nuclear bomb: "It’s so easy to cause so much damage," he said, according to the New York Times. Patrick Gilmore from Akamai likened the technique to using a machine gun to spray an entire crowd in order to kill one person. Akamai found that the attack had significant effects on global network loads, added Gilmore. Apparently, web pages were temporarily inaccessible and streaming services such as Netflix suffered noticeable disruptions.






« Secure Boot complaint filed against Microsoft · Large-scale DNS DDoS attack on Spamhaus · Meanwhile in Egypt the internet is disrupted with divers, and knives »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2013 » Large-scale DNS DDoS attack on Spamhaus

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition