FacebookInstagramTwitterContact

 

BIBD Awareness Campaign           >>           Depart for SEAYLP in the United States           >>           Raya Packet Recycling Drive           >>           No More Ash Clouds over Brunei Darussalam's Airspace           >>           'Appreciate and Be Grateful for the Blessings of Water'           >>           Conversion Ceremony           >>           Tree Planting Initiative           >>           Hari Raya Aidilfitri Celebration           >>           Spacex Launches Starlink Satellites On Company's 40th Mission Of 2024 (Video)           >>           Blizzard takes aim at Overwatch 2 console cheaters           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


How We May've Made Friday's Massive Internet Outage Worse


The attack on Dyn's servers came in two waves, the company said. Screenshot by Laura Hautala / CNET

 


 October 27th, 2016  |  10:41 AM  |   798 views

CNET.COM

 

If a website is suffering from a cyberattack, don't keep trying to get to it.

 

If you kept trying to access Twitter, Reddit, Spotify or Netflix during Friday's massive internet outage, you were part of the problem.

 

Dyn, the company that manages traffic for those sites and that toppled under a huge cyberattack last week explained in a blog post Wednesday how it all went wrong.

 

Innocent attempts to reload pages on the sites just made things worse, the company said, causing servers to refresh their caches and creating "a storm of legitimate retry activity."

 

"When...traffic congestion occurs, legitimate retries can further contribute to traffic volume," wrote Scott Hilton, Dyn's executive vice president of product. "We saw both attack and legitimate traffic coming from millions of [computing devices] across all geographies."

 

New Hampshire-based Dyn confirmed that Mirai malware launched by a botnet made up the core of the distributed denial-of-service attack.

 

DDoS attacks work by clogging servers with traffic, essentially making it impossible for others to visit a website's pages. Mirai has been the malicious software behind several notorious DDoS attacks recently, taking down cybersecurity expert Brian Krebs' website by flooding it with 620 gigabits per second of traffic in September.

 

The malware hijacks internet of things devices -- any simple household object with an internet connection -- and enlists them in its massive botnet to take down websites in a coordinated swoop. Such IoT devices include surveillance cameras, DVRs, Smart TVs and refrigerators.

 

The first wave of attacks on Dyn came in from 7:10 a.m. to 9:20 a.m. ET, just as internet users on the East Coast were waking up and noticing that websites were down. The attacks had come from all over the world, and specifically targeted Dyn's points on the East Coast.

 

The offensive swarmed swiftly, with high-volume floods of data packets disguised to look as if real users were trying to access pages. Traffic bursts were 40 to 50 times higher than normal, Dyn said. The sophisticated attack forced the company's engineers to work on top of a server's automated responses.

 

After about two hours, Dyn managed to fend off the attack, but not for long. The second wave struck at about 11:50 a.m. ET, just two hours after the dust had settled from the first assault.

 

Because the tactics were about the same, though, Dyn was able to get its servers back up in about half the time, the company said, despite the second strike being from more locations. The aftermath from the DDoS attacks lingered on until about 4 p.m. ET on Friday.

 

Dyn is cooperating with a criminal investigation and declined to speculate on why it was attacked.

 


 

Source:
courtesy of CNET

by Alfred Ng

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

In Pictures: India Votes In World's Biggest Election

 2024-04-20 00:10:59

Post Office Lawyer 'Missed' Key Horizon Finding

 2024-04-20 01:27:17