[191622] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Krebs on Security booted off Akamai network after DDoS attack

daemon@ATHENA.MIT.EDU (Mike)
Fri Sep 23 20:45:29 2016

X-Original-To: nanog@nanog.org
To: nanog@nanog.org
From: Mike <mike-nanog@tiedyenetworks.com>
Date: Fri, 23 Sep 2016 11:45:45 -0700
In-Reply-To: <0470bc20-12e9-528e-8465-52739f237c33@rollernet.us>
Errors-To: nanog-bounces@nanog.org



On 09/23/2016 11:30 AM, Seth Mattinen wrote:
> On 9/23/16 10:58, Grant Ridder wrote:
>> Didn't realize Akamai kicked out or disabled customers
>> http://www.zdnet.com/article/krebs-on-security-booted-off-akamai-network-after-ddos-attack-proves-pricey/ 
>>
>>
>> "Security blog Krebs on Security has been taken offline by host Akamai
>> Technologies following a DDoS attack which reached 665 Gbps in size."
>
>
> So ultimately the DDoS was successful, just in a different way.
>
> ~Seth
>
>
More technical information about the characteristics of these attacks 
would be very interesting such as the ultimate sources of the attack 
traffic (compromised home pc's?), the nature of the traffic (dns / ssdp 
amplification?), whether it was spoofed source (BCP38-adverse), and 
whether the recent takedown the vDOS was really complete or if it's 
likely someone else gained control of the C&C servers that controlled 
it's assets?

Mike-

home help back first fref pref prev next nref lref last post