nobbis writes:
"The recent KrebsOnSecurity 200 Gbps DDoS Attack used NTP servers for amplification, a technique that is becoming increasingly common according to Symantec NTP Reflection Attacks and Arbor Networks NTP Attacks.
A similar 400Gbps attack reported by Cloudflare against one of its clients 400 Gbps Attack was intense enough to cause network congestion in Europe.
Brian Krebs believes however that some of the DDoS-for-hire services behind the recent attacks maybe using Cloudflare as a safe haven, a view repudiated by Matthew Prince, CEO of Cloudflare.
The attack against the KrebsOnSecurity site is thought to have been a demonstration of ability from a Hackforums.net user offering a DDoS-for-hire service."
This discussion has been archived.
No new comments can be posted.
KrebsOnSecurity Hit by 200 Gbps DDoS Attack
|
Log In/Create an Account
| Top
| 8 comments
| Search Discussion
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(Score: 5, Funny) by Gaaark on Saturday February 15 2014, @08:08PM
Really hope Mr. Krebs knows what he is doing security wise, 'cause with Spongebob and Squidward working for him..... :O
--- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
(Score: 5, Funny) by combatserver on Saturday February 15 2014, @08:31PM
I hope I can change this later...
(Score: 5, Interesting) by combatserver on Saturday February 15 2014, @09:19PM
Found an interesting take on the recent increases in DDoS attacks...obfuscation. It suggests the attackers are using the DDoS attacks as cover for other activities, and to drive up costs for targets--directly attacking the economic realities of their targets. Brutal.
http://www.crn.com/news/security/300071742/cybercr iminals-using-ddos-as-smokescreen-experts-warn.htm [crn.com]
I hope I can change this later...
(Score: 2, Insightful) by paulej72 on Sunday February 16 2014, @04:52AM
Team Leader for SN Development
(Score: 1) by combatserver on Sunday February 16 2014, @09:09AM
"How about submitting this as an article?"
Good idea. Think I will. Thanks!
I hope I can change this later...
(Score: 5, Insightful) by AudioGuy on Saturday February 15 2014, @09:28PM
If the NSA were actually doing their JOB, instead of playing Peeping Tom, they have enough connectivity and processing power that they could probably trace back to all the zombies used for this purpose, and disable them.
They COULD make DDOS attacks nearly impossible to sustain.
That would require actual competence, though.
(Score: 2, Informative) by mrcoolbp on Sunday February 16 2014, @12:02AM
(Score:1^½, Radical)
(Score: 2) by janrinok on Sunday February 16 2014, @06:45PM
All that would be needed is for some arrests to be made. Once it is obvious that there is a price to pay for DDoS'ing a site it might reduce the frequency at which they occur. That would require intelligence to be collected - but isn't the NSA supposed to be able to do that?
I am not interested in knowing who people are or where they live. My interest starts and stops at our servers.