[191622] in North American Network Operators' Group
Re: Krebs on Security booted off Akamai network after DDoS attack
daemon@ATHENA.MIT.EDU (Mike)
Fri Sep 23 20:45:29 2016
X-Original-To: nanog@nanog.org
To: nanog@nanog.org
From: Mike <mike-nanog@tiedyenetworks.com>
Date: Fri, 23 Sep 2016 11:45:45 -0700
In-Reply-To: <0470bc20-12e9-528e-8465-52739f237c33@rollernet.us>
Errors-To: nanog-bounces@nanog.org
On 09/23/2016 11:30 AM, Seth Mattinen wrote:
> On 9/23/16 10:58, Grant Ridder wrote:
>> Didn't realize Akamai kicked out or disabled customers
>> http://www.zdnet.com/article/krebs-on-security-booted-off-akamai-network-after-ddos-attack-proves-pricey/
>>
>>
>> "Security blog Krebs on Security has been taken offline by host Akamai
>> Technologies following a DDoS attack which reached 665 Gbps in size."
>
>
> So ultimately the DDoS was successful, just in a different way.
>
> ~Seth
>
>
More technical information about the characteristics of these attacks
would be very interesting such as the ultimate sources of the attack
traffic (compromised home pc's?), the nature of the traffic (dns / ssdp
amplification?), whether it was spoofed source (BCP38-adverse), and
whether the recent takedown the vDOS was really complete or if it's
likely someone else gained control of the C&C servers that controlled
it's assets?
Mike-