Another 100 Gigabit DDoS Attack Strikes — This Time Unreflected 93
darthcamaro writes "In March of this year, we saw the first ever 100 Gigabit DDoS attack, which was possible due to a DNS Reflection Amplification attack. Now word is out that a new 100 Gigabit attack has struck using raw bandwidth, without any DNS Reflection. 'The most outstanding thing about this attack is that it did not use any amplification, which means that they had 100 Gigabits of available bandwidth on their own,' Incapsula co-founder Marc Gaffan said. 'The attack lasted nine hours, and that type of bandwidth is not cheap or readily available.'"
Is that all? (Score:5, Funny)
It was probably just one guy in Tokyo using his $9/month internet package ...
Re:Is that all? (Score:5, Funny)
On his mobile, to be exact.
Re:Is that all? (Score:5, Funny)
Re:Is that all? (Score:5, Funny)
...For nine hours.
Re: (Score:1)
Re: (Score:2)
Re: (Score:3)
Easily explained by the presence of a sleeping cat and the F5 key (oh, and he had some crazy Japanese phone that has an F5 key...).
Re:Is that all? (Score:5, Funny)
It was a Korean professional Starcraft player.
Re: (Score:2)
Re: (Score:1)
Re:first (Score:4, Funny)
Incapsula (Score:5, Informative)
Seriously...this reads like a brochure for Incapsula's services lol
Re:Incapsula (Score:5, Interesting)
They don't name the site, they don't name the attacker, the customers were "completely unaffected"....they could be making it up for all we know.
Re:Incapsula (Score:5, Informative)
We are an Incapsula customer and I can tell you we were NOT "completely unaffected". We experienced about an hour total of complete down time and several hours of slow response. Our servers were unloaded - no problems when bypassing Incapsula. So I guess they protected us from "that" but in the meantime all sites were unreachable. Though different ISPs had different levels of slowness at different times (trying our two different office connections and three different mobile networks).
Re:Incapsula (Score:5, Interesting)
We are an Incapsula customer and I can tell you we were NOT "completely unaffected".
Maybe you could call Sean Michael Kerner at eWeek and tell them Marc Gaffan was lying.
He's also on twitter: https://www.twitter.com/techjournalist [twitter.com]
Re: (Score:1)
Re: (Score:1)
You just said they withstood 2400 Gbps, which is incorrect. Also, it should be noted that the 300 Gbps quoted was only the peak, I think the average was only about 120 Gbps.
Re: (Score:1)
Re:Incapsula (Score:5, Interesting)
"....this reads like a brochure for Incapsula's services..."
http://bgp.he.net/AS19551#_whois [he.net]
Well, I imagine most US server farms are hurting pretty bad right now, what with all the NSA luvin' going around over here. Now imagine a company that has all of it's servers in the US, Israel and Germany (with a few in Japan)--in light of recent revelations regarding NSA spying--and maybe you'll understand why Incapsula is paying for ads/articles all over the damn place, including /.
They are fucked, and this marketing blitz is a Hail-Mary attempt to save their ass from the fire that Snowden just lit under it. Personally, I love a good BBQ.
Is this an ad? (Score:5, Insightful)
TFA sure reads like one...
I can't get one thing (Score:5, Insightful)
Re:I can't get one thing (Score:4, Informative)
The article suggests it was a "Distributed attack"
the victim of the attack is remaining in the shadows, not wanting to be publicly identified. The target Website is protected by cloud security vendor Incapsula, which was able to withstand the massive distributed denial-of-service (DDoS) attack and keep the targeted Website up and running.
which means it must have bounced off of some botnet used some means of amplifying the attack and make it appear to come from different targets. Had it not been so, they would know exactly where it came from.
Perhaps judging from the number of different sources, and the type of packets, they can calculate the number of control packets needed.
If they know it required a one-for-one ratio of control packets to target packets, that is what they mean by un-amplified.
But it doesn't mean they came via the same route.
Re:I can't get one thing (Score:5, Insightful)
Re:I can't get one thing (Score:4, Interesting)
This, and you can easily distinguish a reflected attack by the type of packet, which will be an unsolicited reply to an application level request.
I just wish the stupid script kiddies would realize that not every SNMPv2/SNMPv3 client that responds actually amplifies traffic or gives maybe a 30% gain (because what you're getting back is an "access denied") and so isn't worth it, and stop trying to reflect off the printers here. I'm sick of chasing around the people who are supposed to lock them down, and banning entire protocols that don't really, really deserve it just fills me with ick.
Re: (Score:1)
How much bandwidth is that? (Score:4, Interesting)
Is that 100 GB/sec, 100 Gbps/sec, 100 GiB/sec, or 100 GiB over 9 hours?
Re:How much bandwidth is that? (Score:4, Funny)
It's probably not "100 Gbps/sec" since the seconds cancel out and thus isn't a measure of bandwidth (a 12MB attack would be pretty lame). And since TFS said "bits," not "bytes," all of those options with a capital "B" are also unlikely. So, the answer to your question is "no."
Re: (Score:3, Funny)
Seconds don't cancel... it gives you a 100Gbps^2 (aka, 100Gb.s^-2) which is a bandwidth acceleration...
Re: (Score:3, Informative)
The "p" in "Gbps" is "per", that is "/". Therefore "Gbps/s" is "Gb/s^2", which would be a data rate acceleration. "100Gbps/s" would mean that every second, another 100 Gb/s were added to the data stream. Doing that for 9 hours would be quite impressive.
Re:How much bandwidth is that? (Score:5, Funny)
Using the perl "english words have lower priority than real operators" convention (see "and" v/s "&&"), the / binds more tightly than the "per" operator, and thus, it's Gb / (s/s). And the seconds therefore cancel. ;)
Re: (Score:1)
Re:How much bandwidth is that? (Score:5, Informative)
The attack peaked at 100 Gigabits per second
The webhost (actually a CDN) had 400 Gigabits of total bandwidth available + various DDOS protections in place.
RTFA
Re: (Score:1)
Nowhere in that article is the word seconds, Gbps Gb/s or anything similar.
I might be sloppy to say Gigiabit without the /s once or twice, but it's almost like a study in avoiding the qualifier.
Re: (Score:1)
Re: (Score:2)
A clause about deep packet inspection, ongoing monitoring and the option for dynamic ISP speed reductions?
100 GBit isn't large (Score:3, Insightful)
A botnet with 10000 bots, each on a 10 MBit connection, will suffice.
Re:100 GBit isn't large (Score:5, Funny)
Re: (Score:2)
10 Mb/s upstream that is, not downstream.
Re: (Score:2)
10 Mb/s upstream is not that unusual these days. And many botnets are way bigger than 10000 bots. Even if each bot has just 2 Mb/s upstream, you only need 50000 Bots. And botnets are not limited to infecting computers on home user connections. Infecting 100 servers on 1 Gbit/s connections is also enough.
Re: (Score:2)
10 Mb/s upstream is not that unusual these days. And many botnets are way bigger than 10000 bots. Even if each bot has just 2 Mb/s upstream, you only need 50000 Bots. And botnets are not limited to infecting computers on home user connections. Infecting 100 servers on 1 Gbit/s connections is also enough.
Certainly isn't, I've got that in my office in South Africa, which as far as the internet goes is about as backwater as you can get in a G20.
Re: (Score:3)
Not our fault your office is located in South Africa.
I have many offices. Some have 100mbit connections coming out their ears (Tokyo, HK, Singapore, Washington). Others struggle to get 10 (Kabul, Nairobi)
Beiruit is probably the only office which can't get 10mbit connection. The average is far higher.
Re: (Score:2)
The bigger the upload available, the more tightly those servers will be managed. Making not only infection harder, but also detection and losing the bot-server more likely.
If I were a botnet owner I'd be reluctant to use more than say 10% of available upstream, especially where you're on 1 Gb/s you're sure to be noticed if you're using 1 Gb/s but you may get away with 100 Mb/s for a while (that shouldn't affect other services on that network too much). People that have this much bandwidth have it for a reas
Re: (Score:2)
Hang on.
*scribbles on notepad*
I'm just checking your math on that. Yes, I got the same thing.
no real verifiable info but plenty of product plug (Score:5, Informative)
The worst example of advertisement through press release in recent memory.
At least on slashdot.
Re: (Score:1)
The target Website is protected by cloud security vendor Incapsula, which was able to withstand the massive distributed denial-of-service (DDoS) attack and keep the targeted Website up and running.
There are a total of 8 mentions of Incapsula and how fantastic their services are.
worst use of a DDoS (Score:2)
i see no profit or gain doing it to a CDN since they tend to have a distributed infrastructure...
possibly a poker/gambling site
Re: (Score:1)
why not use it ebay for that item you sooo wanted.... get rid of those sniper bids.
i see no profit or gain doing it to a CDN since they tend to have a distributed infrastructure...
possibly a poker/gambling site
A) This was a test, and the real attack has yet to come.
B) This was a test, and the real attack happened while we were staring at this distraction as if it were some kind of voodoo.
C) All the above.
Perhaps we should hold judgement on those who can execute something like this until it is determined the purpose or intent. eBay and gambling is chicken shit compared to attacking banking or stock market.
Re: (Score:3, Insightful)
You missed a possibility:
D) None of the above, it's just Incapsula's anti-DDoS services ad.
The article goes all how attack was "unknown to many" and "victim remains in shadows" (read: we can't even know whether it all took place), and then goes into something that reads like sales brochure.
Re: (Score:2)
I too really wonder who that target may have been. It must be a pretty high profile or valuable site, for an attacker to throw that big an attack against them.
Re: (Score:3)
Re: (Score:2)
You could probably measure congressional (in)activity in bitches per second?
I know what happened (Score:5, Funny)
other than Incapsula and its own service providers that were on the receiving end—no one seemed to notice
Thanks a bunch for saving the internets Marc. I'll be sure not to notice again soon.
Re: (Score:1)
A government playing war games ? (Score:2)
I am not saying that it is what happened this time, but we have to expect that the various governments that are tooling up for ''cyber warfare'' are going to want to try out their toys. A DOS is one of the ''cyber weapons'' that they will use, in addition to cracking web sites, virus infection, ... For a government 100 Gbps is not going to be expensive.
I wonder how far they have progressed on cyber alliances, so, perhaps, 10 NATO countries could each contribute their 10 Gbps DOS asset to create a 100 Gbps D
That's nothing (Score:3, Funny)
I once experienced an DoS MitM LTE XSS attack that lasted 42 hours and had a steady stream of 105TB/ms using NetBIOS Saturation over AppleTalk techniques that spread over a redundant cluster of MBR using HPFS. Of course the victim wishes to remain in the shadows as sharing the company's identity would either harm their reputation or allow you to verify the plausibility of the incident.
Re: (Score:1)
Bullshit! (Score:1)
BULLSHIT!
An unbeknownst 100Gbps DDoS attack from a single source (that is somehow unknown), against an undisclosed target(!), that was miraculously defended against by this unknown company, who would have us believe that they are capable of doing this because of their shear might and use of magical incantations(?).
Bullshit! This entire and UTTERLY FICTITIOUS story is a thoroughly deceitful marketing campaign!
100Gbit (Score:2)
Is what, 100 google users in kansas with compromised machines?
Or 1000 FIOS users...