DDoS Attack on Krebs has implications you should be aware of

Someone on the internet seems very angry with cybersecurity blogger Brian Krebs.

On 20 September, Krebs’ website was hit with what experts say is the biggest Distributed Denial of Service (DDoS) attack in public internet history, knocking it offline for days with a furious 600 to 700 Gbps (Gigabits per second) traffic surge.

DDoS attacks are a simple way of overloading a network router or server with so much traffic that it stops responding to legitimate requests.

According to Akamai (which had the unenviable job of attempting to protect his site last week), the attack was twice the size of any DDoS event the firm had ever seen before, easily big enough to disrupt thousands of websites let alone one.

So why did someone expend time and money to attack a lone blogger in such a dramatic way? Krebs has his own theories, and the attack follows Krebs breaking a story about the hacking and subsequent takedown of kingpin DDoS site vDOS, but in truth nobody knows for certain and probably never will.

DDoS attacks, large and small, have become a routine fact of internet life.

Many attacks are quietly damped down by specialist firms who protect websites and internet services.

But the latest attack has experts worried all the same.

Stop what you’re doing

DDoS attacks first emerged as an issue on the public internet in the late 1990s, and since then have been getting larger, more complex and more targeted.

Early motivations tended towards spiteful mischief. A good example is the year 2000 attacks on websites including Yahoo, CNN and Amazon by ‘MafiaBoy’, who later turned out to be 15-year old Canadian youth Michael Calce. Within weeks, he was arrested.

Things stepped up a level in 2008 when hacktivist group Anonymous started an infamous series of DDoS attacks with one aimed at websites belonging to the Church of Scientology.

By then, professional cybercriminals were offering DDoS-for-hire ‘booter’ and ‘stresser’ services that could be rented out to unscrupulous organizations to attack rivals. Built from armies of ordinary PCs and servers that had quietly been turned into botnet ‘zombies’ using malware, attacks suddenly got larger.

This culminated in 2013 with a massive DDoS attack on a British spam-fighting organization called Spamhaus that was measured at a then eye-popping 300Gbps.

These days, DDoS is now often used in extortion attacks where cybercriminals threaten organizations with crippling attacks on their websites unless a ransom is paid. Many are inclined to pay up.

The Krebs effect

The discouraging aspect of the Krebs attack is that internet firms may have thought they were finally getting on top of DDoS at last using techniques that identify rogue traffic and more quickly cut off the botnets that fuel their packet storms.

The apparent ease with which the latest massive attack was summoned suggests otherwise.

In 2015, Naked Security alumnus and blogger Graham Cluley suffered a smaller DDoS attack on his site so Krebs is not alone. Weeks earlier, community site Mumsnet experienced a DDoS attack designed to distract security engineers as part of a cyberattack on the firm’s user database.

At the weekend, Google stepped in and opened its Project Shield umbrella over Krebs’ beleaguered site. Project Shield is a free service launched earlier in 2016 by Google, specifically to protect small websites such as Krebs’ from being silenced by DDoS attackers.

For now it looks like Google’s vast resources were enough to ward off the unprecedented attack, but it’s little comfort to know that nothing short of the internet’s biggest player was the shield that one simple news site needed.

With criminals apparently able to call up so much horsepower, the wizards of DDoS defence might yet have to rethink their plans – and fast.



Our Take: We ALL need to take note, that this DDoS was on a site that was originally protected by Akamai – one of the companies that is viewed as part of the ‘solution’. They are a solution provider to large businesses – enterprise level businesses, not SMBs like you or even us (CompSecGlobal.com).

Now we also need to note that the site was being protected ‘pro bono’ – or for free – and that this attack was so large (600Mbit/sec is massive), that they could not, or would not continue the protection service and had to throw in the towel. They simply had to give up – and it’s not sure whether they could or would have continued even if they were being paid. We have a feeling that this may have swamped even Akamai’s network (which is MASSIVE).

It is also worth nothing that Google’s Shield service only applies to News sites and other sites where silencing said sites could be considered an attack on the first amendment – if you’re a small business and you annoy a hacker enough to throw massive DDoS attacks your way, then you’re left with paying very large protection bills, or being pushed off the internet. There really aren’t any other options… yet.

Because there are obvious solutions for large enterprises with deep pockets, and Google shield will step in with free protection if you’re a free-speech issue type website, but there are no obvious solutions for for small businesses, we have partnered with a couple of companies that can protect sites at a reasonable price. The right tool depends on the type, size and duration of the attack.

If you’re experiencing persistent DDoS attacks, even if they are NOT YET to the point of taking you offline, get in touch – we have solution options for you – and they’re not priced at an enterprise level!

Ready for the right solutions?

It’s time to offload your technology troubles and security stress.

"*" indicates required fields