GitHub, Twitter, and a long list of known websites are inaccessible for the majority of users worldwide due to the Distributed denial-of-service DDoS attack on the DNS infrastructure of cloud-based Internet management company Dyn.
In recent weeks, we saw the massive attack of 1Tbps DDoS attack at French company OVH, some experts called it a massive DDoS attack in history. This time the latest victim of the DDoS attack is the renowned Dyn DNS provider.
The long list of affected websites includes Esty, Twitter, GitHub, Spotify, PagerDuty, SoundCloud, Shopify, Airbnb, Heroku, and Intercom.
Called a “global event,” GitHub has informed users its upstream DNS is being affected by the attack. Twitter went offline for roughly 4 hours in total.
According to Dyn, the DDoS attack started at 11:10 UTC and affected its customers in the east of the United States. However, people in Asia and Europe have reported no such issue in their part of regions. According to DynStatus.
Investigation: Starting at 11:10 UTC on October 21st-Friday 2016 we began monitoring and mitigating a DDoS attack against our Dyn Managed DNS infrastructure. Some customers may experience increased DNS query latency and delayed zone propagation during this time. Updates will be posted as information becomes available.
Update: Dyn Managed DNS advanced service monitoring is currently experiencing issues. Customers may notice incorrect probe alerts on their advanced DNS services. Our engineers continue to monitor and investigate the issue. – 18:23 UTC
Update: This incident has been resolved. – 22:17 UTC
Experts at FlashPoint confirmed that the botnets used in the DDoS attacks at Dyn were affected by Mirai malware.
Increasingly, DDoS attacks against Internet Service Providers (ISPs) can be highly problematic, especially when the attackers are capable of conducting powerful attacks, such as Mirai, which is being used for DDoS attacks in increasing numbers after source code leaks.
Share this article
About the Author
Peter Buttler an Infosec Journalist and Tech Reporter, Member of IDG Network. In 2011, he completed Masters in Cybersecurity and technology. He worked for leading security and tech giants as Staff Writer. Currently, he contributes to a number of online publications, including The Next Web, CSO Online, Infosecurity Mag, SC Magazine, Tripwire, GlobalSign CSO Australia, etc. His favorite areas Online Privacy, AI, IoT, VR, Blockchain, Big Data, ML, Fintech, etc. You can follow him on twitter.
More from Peter ButtlerRelated Posts
Passengers’ Data Stored on User Devices, not on DigiYatra Storage, says India Govt
KEY TAKEAWAYS Unblocking streaming content from Amazon Prime is easy only if you know the reliable V...
NCSC Chief: Clear Rules Needed to Prevent Cyberspace Conflict and Struggle
A safe and secure digital world necessitates a clear definition and enforcement of international cyb...
‘Revive’ has been upgraded to a banking Trojan on Android
This month, Cleafy’s security researchers discovered a new Android Banking Trojan in the wild....
Asian Industrial Control Systems Targeted by Hackers Using the Shadowpad Backdoor
Unpatched Microsoft Exchange servers in various Asian countries were the target of an attack campaig...
Data Breaches Could Occur Due to Kubernetes Misconfigurations That Were Leaked.
Over 900,000 Kubernetes (K8s) have been discovered to be vulnerable to malicious scans and/or data-e...
Attacks by Cybercriminals Will Become the Main Threat in 2024. Privacy Issues Tendencies
Internet Privacy is the main Concern today Advertisers track your online activities and interf...