{"id":274595,"date":"2016-10-22T02:24:30","date_gmt":"2016-10-22T01:24:30","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/newswire\/internet-denied-whats-behind-the-massive-ddos-attacks\/"},"modified":"2016-10-22T16:47:14","modified_gmt":"2016-10-22T15:47:14","slug":"internet-denied-whats-behind-the-massive-ddos-attacks","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/newswire\/internet-denied-whats-behind-the-massive-ddos-attacks\/","title":{"rendered":"Internet denied: What\u2019s behind the massive DDoS attacks"},"content":{"rendered":"<p>An attack on a major DNS service provider literally broke the internet Friday, impacting more than 80 popular websites, including PayPal, Reddit and Twitter. Here\u2019s how a group of hackers is suspected to have pulled off the takedown.<\/p>\n<div>\n<p>A myriad of websites were unavailable Friday as three separate distributed denial of service (DDoS) attacks on a major internet server blocked service to heavily trafficked websites such as Pinterest, Spotify and the New York Times.<\/p>\n<p>The first attack on the New Hampshire-based server occurred Friday morning, but Dyn DNS Company managed to resolve the issue within a few hours. However, a second attack began in the early afternoon followed by a third. It was not until 6:30 p.m. Eastern Time that all had been\u00a0<a href=\"https:\/\/www.dynstatus.com\/\">resolved<\/a>.<\/p>\n<h2>How did a series of cyber-attacks manage to bring large swathes of the internet to its knees?<\/h2>\n<p>To understand why everyone\u2019s favorite sites were unavailable Friday, it\u2019s important to understand the nature of a Domain Name Server (DNS). Imagine a DNS as a telephone operator from the 1950s. By typing in a website\u2019s name, you are asking the DNS to connect you to a specific server.<\/p>\n<p>When an army made up of botnets uses Wi-Fi routers, computers and other devices connected to the internet to create a network that can operate malware without the owner\u2019s knowledge, they overwhelm a DNS server with requests that appear to be normal, so a system like Dyn\u2019s struggles to filter them out.<\/p>\n<p>\u201c<em>They&#8217;re tough attacks to stop because they often get channeled through recursive providers. They&#8217;re not cacheable because of the random prefix,\u201d<\/em>\u00a0Matthew Prince, co-founder and CEO of the content delivery and DDoS protection service provider CloudFlare\u00a0<a href=\"http:\/\/arstechnica.com\/security\/2016\/10\/double-dip-internet-of-things-botnet-attack-felt-across-the-internet\/\">explained<\/a>\u00a0to Ars Technica. When they generate requests, they attach random text to the front of domain names \u2013 which is how they appear to be unique requests.<\/p>\n<p>These requests pour in by the tens of millions. Like any operator receiving millions of requests at once, Dyn\u2019s DNS broke down.<\/p>\n<p>Another part of the issue is the kind of malware used in the attack. Internet of Things devices were targeted and that covers anything with an internet connection. This includes everything from a standard computer to cellphones to Google Home to video cameras. In fact, the Prodigo Espresso maker relies on Internet of Things (IoT) technology. Therefore, a fancy coffee maker could have been partially responsible for putting a pause on Spotify.<\/p>\n<p>It certainly doesn\u2019t help that the source code for a vicious type of malware was released on the dark web earlier this month. Known as Mirai, it spreads to IoT devices by scanning the internet for vulnerable devices that are seeded with malicious software. Once that software is in, an Espresso maker or other IoT appliance can become a central control server for a DDoS attack,\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2016\/10\/source-code-for-iot-botnet-mirai-released\/\">according<\/a>\u00a0to Krebs on Security.<\/p>\n<h2>Is this a hack?<\/h2>\n<p>Not exactly. While some companies that handle money transfers, such as PayPal and Amazon, were affected, there is currently no evidence that any information was breached. PayPal\u00a0<a href=\"http:\/\/www.reuters.com\/article\/us-usa-cyber-idUSKCN12L1ME\">told<\/a>\u00a0Reuters that its networks had not been hacked.<\/p>\n<h2>Who\u2019s behind these attacks?<\/h2>\n<p>This is a good question that many are scrambling to answer. New World Hackers has claimed responsibility for the attack, according to activist and web consultant Gissur Simonarson. The shadowy group has prided themselves on their DDoS attacks, such as one that took the BBC\u2019s website down last year.<\/p>\n<p>In an\u00a0<a href=\"http:\/\/www.anonintelgroup.com\/2016\/10\/21\/twitter-down-its-not-the-russians-its-the-new-world\/\">interview<\/a>\u00a0with Anon Intel Group, a representative of New World Hackers claimed the attack was \u201c<em>an annual power test<\/em>,\u201d and \u201cthis<em>\u00a0is actually against Russia. Testing power is the key. Like that we see how much bandwidth each attack outputs\u2026<\/em>\u201d<\/p>\n<p>They claim that Friday\u2019s attack was something of a warning shot to Russian hackers, saying: \u201c<em>Russia is pretty much saying they are better than the US by hacking into everything, attempting to start a war. We will show them a war.<\/em>\u201d<\/p>\n<p>The attacks came from all around the world, and both the FBI and Department of Homeland Security have said they were investigating, Reuters\u00a0<a href=\"http:\/\/www.reuters.com\/article\/us-usa-cyber-idUSKCN12L1ME\">reported<\/a>. The member of New World Hackers told Anon Intel: \u201c<em>We don\u2019t want federal agents on our ass. That\u2019s why we are in Russia.<\/em>\u201d<\/p>\n<p>WikiLeaks has claimed to be passively involved, tweeting out, \u201c<em>We ask supporters to stop taking down the US internet. You proved your point.<\/em>\u201d<\/p>\n<p>If New World Hackers is indeed behind the attack, then it was unlikely to have been in the name of aiding WikiLeaks. The Twitter account for New World Hackers told Simonarson: \u201c<em>WikiLeaks and Russia are kind of iffy. Sometimes we are friends, sometimes not. Overall, we are just against Russia because they are against the US.<\/em>\u201d<\/p>\n<h2>Is this a one-off occurrence?<\/h2>\n<p>There\u2019s no way to predict the future, but it is safe to assume that this will happen again. While this is the largest attack, if New World Hackers makes good on their promises to attack other countries it will likely happen again.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/20_CmHWyhto\" width=\"854\" height=\"480\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<\/div>\n<p>Via <a href=\"https:\/\/www.rt.com\/usa\/363714-ddos-dns-attacks-hackers\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=RSS\">RT<\/a>. This piece was reprinted by <a href=\"http:\/\/rinf.com\">RINF Alternative News<\/a> with permission or license.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An attack on a major DNS service provider literally broke the internet Friday, impacting more than 80 popular websites, including PayPal, Reddit and Twitter. Here\u2019s how a group of hackers is suspected to have pulled off the takedown. A myriad of websites were unavailable Friday as three separate distributed denial of service (DDoS) attacks on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":274596,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[519],"tags":[],"class_list":{"0":"post-274595","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-newswire"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/274595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=274595"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/274595\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/274596"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=274595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=274595"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=274595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}