Attacks Used the Internet Against Itself to Clog Traffic

An escalating cyberattack involving an antispam group and a shadowy group of attackers has now affected millions of people across the Internet, raising the question: How can such attacks be stopped?The short answer is: Not easily. The digital “fire hose” being wielded by the attackers to jam traffic on the Internet in recent weeks was made possible by both the best and worst aspects of the sprawling global computer network. The Internet is, by default, an open, loosely regulated platform for communication, but many of the servers that make its communication possible have been configured in such a way that they can be easily fooled.The latest attacks, which appeared to have subsided by Wednesday, have demonstrated just how big a problem that can be.
http://www.nytimes.com/2013/03/28/technology/attacks-on-spamhaus-used-internet-against-itself.htmlAlso see:Internet slows down after DNS attack on Spamhaus
Hundreds of thousands of Britons are unsuspecting participants in one of the internet’s biggest cyber-attacks ever – because their broadband router has been subverted.Spamhaus, which operates a filtering service used to weed out spam emails, has been under attack since 18 March after adding a Dutch hosting organisation called Cyberbunker to its list of unwelcome internet sites. The service has “made plenty of enemies”, said one expert, and the cyber-attack appeared to be retaliation.
http://www.guardian.co.uk/technology/2013/mar/27/cyber-attack-spamhaus-slows-down-internetMisconfigured, Open DNS Servers Used In Record-Breaking DDoS Attack
This was not your typical hacktivist DDoS attack: a massive, 300 gigabits-per-second traffic attack against volunteer spam filtering organization Spamhaus spread yesterday to multiple Internet exchanges and ultimately slowed traffic for users mainly in Europe.Security experts say the attacks appear to be in retaliation for Spamhaus recently blacklisting CyberBunker–a notorious hosting provider based in The Netherlands that provides anonymous hosting–as a spam conduit. The attack, which as of this posting had subsided, at its peak today hit 300 Gbps, a massive leap from the previous record 100 Gbps-sized DDoS attacks seen only occasionally. While CyberBunker itself has not claimed responsibility for the attacks, a self-proclaimed Internet activist told the The New York Times today that CyberBunker executed the attacks against Spamhaus in protest of its overstepping by blacklisting the hosting service.
www.darkreading.com/vulnerability-management/167901026/security/attacks-breaches/240151862/misconfigured-open-dns-servers-used-in-record-breaking-ddos-attack.htmlSpamhaus attacks expose huge open DNS server dangers
Massive distributed denial of service attacks on Spamhaus this week focused widespread attention on the huge security threats posed by millions of poorly configured Internet Domain Name System (DNS) servers.
http://www.computerworld.com/s/article/9237951/Spamhaus_attacks_expose_huge_open_DNS_server_dangersDDoS attack against Spamhaus later targeted Tier 1 providers [IDG]
A distributed denial-of-service (DDoS) attack of unprecedented scale that targeted an international spam-fighting organization last week ended up causing problems for Internet users around the world, experts say.
http://www.computerworld.com/s/article/9237939/DDoS_attack_against_Spamhaus_later_targeted_Tier_1_providers

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.