Wednesday, February 7, 2007

Root DNS Attack - Possible Probe Attempt

Via darkreading.com -

An attack on the Internet infrastructure yesterday may signal a hint of bigger things to come. The distributed denial-of-service (DDOS) attack that temporarily crippled -- but didn't take down -- two of the Internet's 13 Domain Name System (DNS) root servers was likely a test-run for a potentially larger and more disruptive attack, researchers say.

This was the latest in a series of DDOS attacks on DNS servers that began late last year, when DNS providers EveryDNS and EasyDNS each were separately knocked offline by attacks. Experts had predicted it was only a matter of time before botnet operators hit a bigger and higher-profile DNS target, and that's just what happened yesterday, they say.

The attackers targeted five of the Internet's DNS root name servers, using bots or zombified computers to execute the DDOS attack. Two of the root name servers eventually dropped 90 percent of their DNS query traffic, but the remaining servers kept the service operational. (See DNS Attacks on the Rise and DNS Service Under DDOS Attack .)

"Yesterday's attack was likely a precursor to a larger attack. The rise of DNS attacks in the last year has been worrisome," says David Ulevitch, CEO of OpenDNS, and founder of EveryDNS, both DNS services. "I believe the attack yesterday and the night before were tests to see how far someone could push the limits."

Ulevitch says the attackers split their attack capacity among a half-dozen or so targets. "Their overall DDOS capacity is significant, and is something to pay attention to," he says.

---------------------------------------------------

This article brings up a very good point.

How many business could really withstand such a direct DDoS attack?

This type of stuff should scare the crap out of those in the markets of money.

No comments:

Post a Comment