Massive attack on web root servers

Posted by   Virus Bulletin on   Feb 7, 2007

Large-scale DDoS barrage hits top-level DNS machines.

An exceptionally large Distributed Denial of Service (DDoS) attack took place yesterday, targeting the root DNS servers at the core of the Internet.

Though little detail has yet emerged about the attack, it is rumoured to have originated from South Korea, and is thought to have caused temporary outages in at least three of the 13 root servers. Those serving .org domains are said to have been particularly affected, as well as US Department of Defense hardware. Web service company UltraDNS, responsible for many of these servers, has confirmed a spike in traffic.

No purpose has yet been discovered for the launching of the attack, which is thought to have lasted around 12 hours but had minimal effect on actual web connectivity thanks to improvements in distributing workloads. Suggested reasons have included testing botnets and pure malice.

The SANS Internet Storm Center has put up a brief message, here, and hope to provide more information as it becomes available.

Posted on 07 February 2007 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.