Distributed Denial Of Service (DDoS) attack

The #1 community for Gun Owners in Indiana

Member Benefits:

  • Fewer Ads!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • bwframe

    Loneranger
    Site Supporter
    Rating - 100%
    94   0   0
    Feb 11, 2008
    38,183
    113
    Btown Rural
    This Is Probably Why Half the Internet Shut Down Today*[Update: It?s Happening Again]

    Cyberattack Knocks Out Access to Websites - WSJ

    Twitter, Spotify and Reddit are among major sites taken OFFLINE in massive shock cyber attack | Daily Mail Online

    https://techcrunch.com/2016/10/21/many-sites-including-twitter-and-spotify-suffering-outage/


    Major internet services, including Twitter and Spotify, are suffering massive outages today as a US internet provider comes under cyber attack.

    The internet service company Dyn said that it had suffered a denial of service (DDoS) attack on its domain name service shortly after 6AM ET (11AM BST).

    The outages mostly affected the east coast of the US, and a second attack was believed to be underway at 1PM ET.
    It was not immediately clear who was responsible and Gillian Christensen of the U.S. Department of Homeland Security said the agency was 'investigating all potential causes.'
     

    pudly

    Grandmaster
    Rating - 100%
    35   0   0
    Nov 12, 2008
    13,329
    83
    Undisclosed
    DDoS attacks certainly aren't new. They in fact are pretty much a continuous fact of life on the Internet. It is just a question of who are the current target(s) to determine how likely it is to be publicized.

    There are millions of hacked computers and computer-containing devices (all those "smart" devices/Internet-of-Things) that are used in various attacks. Your "smart" TVs, home routers, internet-connected video cameras, etc, etc. are all potential participants in this attack. The Internet of Things is horrendously insecure. The vast majority of such devices have no way to apply security updates to their software, have poor security design, published default passwords, etc. that make them easy to take over and repurpose to perform functions other than you think they are doing.
     
    Last edited:

    T.Lex

    Grandmaster
    Rating - 100%
    15   0   0
    Mar 30, 2011
    25,859
    113
    DDoS attacks certainly aren't new. They in fact are pretty much a continuous fact of life on the Internet. It is just a question of who are the current target(s) to determine how likely it is to be publicized.
    Yes, but in fairness, this seems of a larger scale and "better" targeted than what script kiddies can achieve.

    I haven't seen a source for how this is one is being conducted - bad pings seems unlikely. ;)
     

    femurphy77

    Grandmaster
    Rating - 100%
    30   0   0
    Mar 5, 2009
    20,282
    113
    S.E. of disorder
    Where's Al Gore when we need him.

    I have no idea, but I bet he's eating.

    There can only be one possibility to why Al is nowhere to be seen. . .

    images
     

    pudly

    Grandmaster
    Rating - 100%
    35   0   0
    Nov 12, 2008
    13,329
    83
    Undisclosed
    Yes, but in fairness, this seems of a larger scale and "better" targeted than what script kiddies can achieve.

    I haven't seen a source for how this is one is being conducted - bad pings seems unlikely. ;)

    Major DDoS attacks have never been the realm of script kiddies.

    The state of the art is from state actors and cyber criminals. Pings are old news for DoS attacks. They don't have the volume of modern attacks and are more easily traceable back to the sources.

    Current attacks are far larger volume and harder to trace. They likely use some variation of a reflection attack. You send a series of queries from a hacked internet-connected device to a legitimate server with a forged "from" address- one pointing to your target instead of yourself. So, for every request you send to the server, it returns a much larger response to the targeted system. This makes the originator harder to identify and increases the power of the attack. Multiply this by thousands of requests/second from hundreds of thousands of owned computers and you can overwhelm pretty much any service out there.

    This type of "service" can be contracted for a nominal amount and pointed against whoever you want to hit. It has been used commonly to blackmail commercial sites, block political targets and other uses. Like I said. It isn't new and it isn't novel. It is just a question of who the blast is pointed at to determine how much it is noticed by the public.
     
    Last edited:

    T.Lex

    Grandmaster
    Rating - 100%
    15   0   0
    Mar 30, 2011
    25,859
    113
    Jokes, my friend. ;)

    This appears targeted at deeper than just a set of sites, but at Dyn infrastructure itself.

    Test run? Maybe seeing what opens up when they clog all the normal stuff? Wonder why they picked today. A Monday seems like it'd be more impactful.
     

    JettaKnight

    Я з Україною
    Site Supporter
    Rating - 100%
    6   0   0
    Oct 13, 2010
    26,558
    113
    Fort Wayne
    My guess is a test run in preparation for ????

    Chicoms? Russians? Anonymouse? I don't think the DPRK has the bandwidth to do much of anything.
     

    pudly

    Grandmaster
    Rating - 100%
    35   0   0
    Nov 12, 2008
    13,329
    83
    Undisclosed
    Last edited:

    pudly

    Grandmaster
    Rating - 100%
    35   0   0
    Nov 12, 2008
    13,329
    83
    Undisclosed
    My guess is a test run in preparation for ????

    Chicoms? Russians? Anonymouse? I don't think the DPRK has the bandwidth to do much of anything.

    Although it could be a state actor, the really scary thing is that it could be a much smaller group, such as some hackers who's assembled a large botnet that they can use to blast whoever they want. They don't use their own servers to blast out the DDoS attack, so it is much harder to trace who is actually responsible.
     

    opus1776

    Expert
    Rating - 100%
    10   0   0
    Apr 28, 2008
    900
    28
    No jokes right now, this is serial.


    Just imagine how bad it would be if it were parallel......:p
















    ======================================
    "Nothing tastes as good as skinny feels" K. Moss
    You can NEVER be too rich or too thin.
    Life is not a journey, but a series of unplanned detours...
    Perfection: is not a goal---it's a demanded expectation.
     

    printcraft

    INGO Clown
    Site Supporter
    Rating - 100%
    16   0   0
    Feb 14, 2008
    39,063
    113
    Uranus
    I have to wonder if this is response to the diplomacy plan john ****ing kerry announced a couple of days ago?
     
    Top Bottom