Large-scale DDoS attacks targeting Amazon, Google, and Pornhub
More and more hackers may be exposed to powerful DDoS attacks, which can exceed 1 Tbps and force the website to go offline.
After last week's attack on Github, the new enhanced DDoS attack targeted mainstream websites such as Google, Amazon, and Pornhub, and even included the American Rifle Association.
Github became the first victim with a high degree of attention and suffered a 1.35Tbps attack, which may be the largest DDoS attack record at that time. But a few days later, an unnamed U.S. service provider suffered a separate attack with a peak traffic of up to 1.7 Tbps.
Unfortunately, the DDoS attack has not stopped. Qihoo 360 said in a blog post that they have attacked more than 7000 independent IP addresses in the past seven days. Most of the targets are in the US and China, and gaming websites including Rockstargames.com, Minecraft.net, and Playstation.net are gaining popularity.
In addition, DDoS attacks have already bombed at least three different NRA-related sites. It is not clear who is behind these attacks, but there must be many people involved in these attacks.
DDoS protection provider Radware agrees with the discovery of Qihoo 360. According to Radware security researcher DanielSmith, many of these attacks reach 500 Gbps to 1 Tbps. But the good news is that they seldom continue.
He said that Internet service providers and websites began to filter and blacklisted attack traffic because the attack traffic arrived through a specific network port. Other companies like Google and Amazon are designed to process large amounts of input data.
The security community is also steadily addressing the key to all attacks-the vulnerable memcached server. About 0.1 million online storage systems were publicly exposed a week ago. However, Smith says the server owner has fixed about 60 thousand servers. This means that another 40000 servers can still be attacked.
He also noted another worrying development. On Tuesday, Defcon. pro, a major DDoS attack provider, began selling attacks driven by memcached servers. The platform has over 11,000 registered users and encourages all users to test new features.
Smith said: "This is a race to fix memcached servers. Before these servers are widely used, everyone can use them ."
360 has a website that provides real-time information about ongoing attacks. So far, approximately 15 thousand attacks have been recorded since the beginning of last month.
* Reference Source: PCmag
This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151354.htm