Using DDoS to attack cyber security companies to make money

Source: Internet
Author: User
Tags firewall

According to the network related news, recently Beijing network supervisor and Interpol, successfully cracked a network security company employees using hacker means DDoS attacks, to a domestic signature network game server launched a flood trip, lasted one months of server paralysis to the game directly caused by millions of economic losses. During the attack, the game security engineer allegedly changed the IP link address of the game, but the DDoS data stream swooped again after a brief five-minute adjustment.

Event Playback

A network game company in one months ago, hosted in Beijing, Shanghai, Shijiazhuang, multiple servers, varying degrees of traffic DDoS denial of service data flow attacks, immediately reported. Police forensics found that the attacker forged the IP source address, and online gaming company after the attack, a network security company to sell the firewall, in the trial of its marketing firewall after the DDoS attack reduced, but during the cessation of the use of DDoS data stream crazy increase. To this network police and Interpol immediately investigate the cyber security company, the results found that the implementation of DDoS attack suspect is 4 network security product development company employees. The case, the original company is mainly engaged in network security products production, sales and development, in order to increase the effectiveness of the defy, first of all involved in Beijing, Hangzhou, a number of network game servers launched network attacks, the success of the attack company to sell their own equipment, profit from it. What exactly is the DDoS attack? How did four people achieve such a powerful offensive?

Analyzing DDoS

DDoS is also known as distributed denial-of-service (distributed denial of service), a special DOS based Denial-of-service attack, a distributed, collaborative, large-scale attack that uses N-controlled computers to send a large number of packets to a single machine to form an attack. This rapid attack is so devastating that it is difficult to guard against.

DDoS in the attack before the general need to lock the network IP address target, such as: Online games server, Enterprise site, DNS server. (Tip: The attacker who implements such an attack is for money, second, in order to show their own technology, the target address, the hacker will be in a large number of chickens to gain control of DDoS attack attacks and attack the IP address, and finally in the unified time to send the attack command and controlled computers, At this point in the Internet, n computers access a server at the same time, to form an attack, so that the attacked computer can not handle a large number of data caused by slow response, resulting in a panic or crash. (Important: Some smart hackers will change the control of the computer, automatic forgery attack packets sent out of the IP address, the formation of reflection attacks, aggravating the target host data flow intensity).

the phenomenon when attacked by DDoS

The following characteristics occur when a network server is attacked by DDoS, and managers have to respond as early as possible. The hacker will take advantage of the flaw in the service or transmission protocol provided by the victim host, repeated high-speed issue of specific service requests, first in the attacked host will be a large number of waiting TCP edge, and accompanied by false data packets, forged source address so that the target machine can not be processed to form a high flow, Second, the victim machine is unable to handle the normal TCP connection request properly, and drags to the system to slow down without responding to the system crash. Therefore, the formation of the above case of the game server can not work, resulting in losses!

The law cannot be burned by love

According to the No. 286 article of the criminal law of our country, it is stipulated that the function of computer information system should be deleted, modified, added and interfered, and the computer information system can not run normally, and the consequence is serious, and the result is more than five years imprisonment or criminal detention. A company specializing in network security for the benefit of the defy, the use of hackers to launch DDoS attacks, its line is sad, its feelings are not forgiven. Now Luo MoU, Li MoU, Huang MoU, side a 4 person is suspected to destroy computer information system has been approved by Haidian Procuratorate office to arrest.

PostScript: network security is by common construction, please each user to good own computer security door, reduce the emergence of network chickens, so that hackers can not face a huge DDoS attacks, but also a network of security, tranquility.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.