The denial of service is a cyberattack that seeks to prevent a target from receiving or transmitting information over the internet. DDOS attacks work by flooding websites with too much traffic that they cannot handle
Well, we had to live through this in 2016 with the DDoS attack that was stopped just six hours later. If you don’t know about that one yet, let us tell you about it.
In “Denial of Service”, the servers are overloaded by allegedly numerous requests from different computers and the server shuts down itself due to a technical inability to handle such requests. This can be achieved with larger volumes of data or in a specific sequence. It is said that the volume of data sent per second on these servers is usually large enough for the server to automatically shut off using an automatic protection software thereby bringing down service upon the server.
How does DDoS works?
DDOS attackers utilize a process known as “amplification” to disrupt network resources. Disruptions such as website loading delays, message delays, and finally downtime can be caused by the process of amplification.
It was able to take down many websites and services by flooding them with traffic. The attack was especially notable because it was able to use devices that were infected with malware, such as routers and webcams.
Almost all major companies that represent the modern era have become a victim of DDOS attacks at least once in their lifetime. Quite often, such mega attacks take down large portions of services and stay down until the administrators decide to ignore access requests. Learn how one company was a recent victim of the largest DDOS attack in history but was able to recover quickly with a previous experience.
On October 21, 2016, the Mirai botnet launched a Distributed Denial of Service (DDoS) attack against the website of internet service and hosting provider Dyn. This attack caused widespread disruption, as many popular websites that were hosted by Dyn became unavailable. The Mirai botnet was able to launch this attack by taking control of thousands of devices that were equipped with default or weak credentials. These devices included home routers, webcams, and digital video recorders.
The attack was perpetrated by a botnet made up of internet-connected devices that had been infected with the Mirai malware. The attack caused the website to go offline for several days. The Mirai botnet was able to take down the website by using a large number of devices that were infected with the Mirai malware. The devices that were used in the attack were mostly cameras and routers.
To stop the attack, law enforcement and security researchers worked together to track down and take down the servers that were controlling the infected devices. This effort eventually led to the arrest of one of the individuals responsible for the attack.
While the Mirai botnet attack was a wake-up call for many organizations, it’s important to note that DDoS attacks are still a very real threat.
Just last year, we saw one of the largest DDoS attacks ever recorded, with a single attack reaching 1.7 Tbps in size. Another major botnet attack followed shortly thereafter. Called WireX, it was notable in that the attackers used a vulnerability in Skype’s infrastructure to deliver their attacks, rather than taking control over unaware devices. While it was certainly an impressive feat, hopefully, it won’t be repeated anytime soon. Thank you for reading!