Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security IT

EveryDNS Under Botnet DDoS Attack 154

mellow marsh writes "EveryDNS, sister company to OpenDNS (which runs the PhishTank anti-phishing initiative), has been hit by a massive distributed denial-of-service attack. The attack started sometime Friday afternoon and, from all indications, was targeting Web sites that used free DNS management services provided by EveryDNS. At the height of the DDoS bombardment, EveryDNS was being hit with more than 400mbps of traffic at each of its four locations around the world. From the article: '"We were collateral damage," Ulevitch explained... Because law enforcement is involved, Ulevitch was hesitant to release details of the actual target but there are signs that some of the targets were "nefarious domains" that have since been terminated.'" OpenDNS, which makes use of EveryDNS services, was affected for a time, until they spread their authoritative DNS more broadly. The EveryDNS site is now reporting that the attack is continuing but has been mitigated and is not affecting operations.
This discussion has been archived. No new comments can be posted.

EveryDNS Under Botnet DDoS Attack

Comments Filter:
  • Re:correct URL (Score:2, Insightful)

    by Anonymous Coward on Saturday December 02, 2006 @10:12PM (#17085622)
    Well, if they are under a DDoS attack, there is no need to add salt to their wounds.
  • Re:Questions? (Score:4, Insightful)

    by TubeSteak ( 669689 ) on Saturday December 02, 2006 @10:42PM (#17085796) Journal
    Because law enforcement is involved, Ulevitch was hesitant to release details of the actual target but there are signs that some of the targets were "nefarious domains" that have since been terminated.
    What does that mean?
    Was this a 'righteous' attack on malicious websites?
    Or just some intramural warfare by one nefarious group upon another?
  • by ScentCone ( 795499 ) on Saturday December 02, 2006 @10:49PM (#17085830)
    A client (a pretty large retail chain) was using EveryDNS for forward lookups to the mail server's A record. Mail they were sending out started to bounce because receiving mail servers weren't happy when trying to validate the sending box. In once case, a vital piece of mail sent to a state taxing authority couldn't get through on a month-end calendar deadline, causing much grief. Yes, alternate communcations channels are always an option, but it wasn't immediately clear why the two mail servers in question appeared to be hating each other.

    Worse, the state government box's spam filtering appliance blacklisted the retailer's server, and a third party admin had to get involved to free things up. Quite a mess.

    But the real lesson? People who say that a "cyber attack" couldn't really hurt the economy are wrong, wrong, wrong. This stuff can be really disruptive, and this was a pissant little scaled-down example. No major damage, but a lot of thrashing around, untold manhours of lost productivity, and (in the case of the anecdote in question, involving just one retail company), probably some tax fines which will require much tail chasing to get waived once the the story is clearly told, assuming the state government in question is feeling sporting about it.
  • by plasmacutter ( 901737 ) on Saturday December 02, 2006 @11:04PM (#17085920)
    What is "nefarious"?

    to some.. the pirate bay and allofmp3 are "nefarious domains"..

    to others "www.f**Ktimewarner.com" and "walmartsucks.com" are "nefarious domains"

    and to others "www.wikipedia.org" and "www.aclu.org" are "nefarious domains".

    I have a lot of trouble with the idea that DDOS attacks were being carried out in (apparently successful) attempts to wipe domains off the face of the earth..

    this implies the attackers had no legal standing to take those domains offline.. then they call them "nefarious" after the fact.
  • by Chris Tucker ( 302549 ) on Saturday December 02, 2006 @11:15PM (#17085984) Homepage
    Compromised Windows machines network.

    Where are the class action suits against Microsoft for continually producing such flawed software that makes it easy to 0wn a box?

    If it wasn't for 20 some years of MS indifference towards security, there wouldn't be botnets like this, being used for DDOS attacks and forwarding billions of spams a day.

  • by Anonymous Coward on Saturday December 02, 2006 @11:24PM (#17086032)
    I'm no MS fan, but it is worth noting that most of the OS's you mention were even less secure than Windows at the time the internet was being developed.

    The difference is that very few people knew the exploits and fewer still were in a position to actually use them.
  • by SuperBanana ( 662181 ) on Saturday December 02, 2006 @11:30PM (#17086064)

    In once case, a vital piece of mail sent to a state taxing authority couldn't get through on a month-end calendar deadline, causing much grief.

    Maybe a)it shouldn't be left until the deadline and b)sent via email, if it's so damn important.

    And maybe you not tell clients to use a free DNS hosting service as their sole DNS provider...

  • by ScentCone ( 795499 ) on Saturday December 02, 2006 @11:30PM (#17086068)
    What reason could there be for botnet owners to attack EveryDNS? I can't see that they'd gain anything from it.

    It's an indirect attack against people who use EveryDNS to get traffic to their own sites (or mail servers, etc). If you ran, say, an online casino, and your main competition for a particular type of customer happened to have EveryDNS doing their forward lookups... and you could shut down your competition for at least a full business day by torpedoing the DNS they need to be seen - presto, done. EveryDNS wasn't the target, their customers were the target.
  • by Pig Hogger ( 10379 ) <pig.hogger@g[ ]l.com ['mai' in gap]> on Saturday December 02, 2006 @11:57PM (#17086202) Journal
    In once case, a vital piece of mail sent to a state taxing authority couldn't get through on a month-end calendar deadline, causing much grief.
    That grief is well deserved. E-mail is **NOT** reliable, and delivery is **NOT**, **CAN NOT** and **WILL NOT** be guaranteed. So anyone stupid enough to entrust "vital" communication to e-mail rightly deserves to have his arse whipped real good.

    Myself, a month ago I missed an opportunity to collaborate on a TV miniseries. Why? Because the moron who asked me for my collaboration absolutely trusted e-mail, and it was **THE** message that bounced thanks to a network glitch, and that moron didn't think of calling me on the **PHONE**. Well, if they were stupid enough to trust e-mail like that, they probably would have made a crappy miniseries anyways.

    For casual communications, there is e-mail.

    For vital ones, there is registered mail, fax or phone.

  • Re:sue (Score:2, Insightful)

    by The Mysterious X ( 903554 ) <adam@omega.org.uk> on Sunday December 03, 2006 @12:08AM (#17086254)
    Because nobody has broken into the dog and forced it to bite somebody.
  • by Anonymous Coward on Sunday December 03, 2006 @12:56AM (#17086514)
    Since when is 'not user friendly' a feature? This smells like Microsoft marketing, but it's coming from OSS people now. We don't let people who aren't geeks use our software.

    Me, I'm a geek who uses Windows. I do computer fixes for a living, and I need to be intimately familiar with the systems my clients use, which are almost 100% Microsoft. Yet, despite running such 'inherently flawed software,' I haven't had a virus/trojan on one of my boxes. Ever. Turns out geeks are secure, regardless of what OS they use. We know how to put up firewalls, install AV software, recognize scams and evil email attachments.

    News flash: Ignorant people are easy to take advantage of. The fact that MS is user friendly enough to let stupid users on isn't a reason to bash them. There are many reasons, but not that.

    *Waits to get modded -1 [Microsoft]*
  • by Beryllium Sphere(tm) ( 193358 ) on Sunday December 03, 2006 @02:42AM (#17087034) Journal
    Do we know that the botnet was the result of remote exploits and not the result of users explicitly downloading software that happened to be Trojanized? We can blame Microsoft for opening ports without need, having insecure software listening to those ports, and for making drive-by downloads possible. But if someone just insists on installing dancing cursors or weather forecasts, that's not Microsoft's fault.
  • by Shados ( 741919 ) on Sunday December 03, 2006 @03:36AM (#17087264)
    Well, considering that #1 if Linux had the market share Windows has, it would be a bigger chunk, the fact is most Windows viruses are probably caught by users -willingly- installing crap on their computers. If you're a retarded user, and you see a "L33t KDE icon package!" and follow instructions that tell you to login as root and run an executable, your box will get owned either way. Sure, Linux takes more steps to prevent this, but still.
  • by JaredOfEuropa ( 526365 ) on Sunday December 03, 2006 @07:22AM (#17088174) Journal
    Your example just goes to show that normal people do see email as reliable enough for important missives. And they are right; it gets to where it should be most of the time. Just like regular mail, by the way. They normally are both good enough for all but the most important messages.

    A lot of mail is misdelivered or just lost. Yet the tax people do not demand that we send in our tax returns by registered mail. And would you be as pissed at the miniseries people if they'd sent you a letter by regular mail and the letter subsequently got lost?
  • by Mixel ( 723232 ) on Sunday December 03, 2006 @09:04AM (#17088572) Homepage
    DOS attacks are easy to pervent

    Learn to spell, get a clue.

    There is nothing you can practically do to prevent someone on the internet from sending a packet addressed to you, nor two packets, nor 1000000. There is nothing you can practically do to prevent the source address on each of those packets to be different. If a DOSer has much bigger pipes than you, you are sunk, unless you can do something very smart. For a start, getting remote access to your server during a DOS attack is tricky unless you have redundancy. Then you need to profile the traffic, find patterns which you can filter.

    The non-triviality of a (D)DOS is the reason why everyone is interested to learn how to defend against such attacks. This is why we want to hear how EveryDNS handled the problem so well. A second-rate admin would not be able to. While I appreciate your sentiment regarding "survival of the fittest". I feel it can be better expressed as "survival of the fittest admin for the job".

    And lets not try to discuss how, if they can carry this out, you are going to catch them
    As there are lots of admins on /., it is only natural that they want to get fitter through learning how to deal with such attacks. Therefore the how is very important and very much worth discussing. Problems don't magically resolve themselves, though it may seem like that because professional and dedicated people spend much of their time figuring out how to deal with them effectively.

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...