Quite Possibly the Biggest HACK in U.S. History is goin down...NOW!!

SalamiAttack

All Star
Joined
Oct 5, 2015
Messages
1,550
Reputation
6,415
Daps
4,923
Reppin
The Ancient City of Brooklyn
Government probes major cyberattack causing internet outages

Digital assailants affiliated with the hacking collective Anonymous appeared to take credit for at least a portion of the ongoing siege, indicating that it was retaliation for the Ecuadorian government's decision to cut off internet access for WikiLeaks founder Julian Assange over his site's ongoing leaks of alleged internal documents from Hillary Clinton's presidential campaign.

The digital assault affected internet users along the East Coast, and caused hundreds of sites to be inaccessible both early in the morning, and then again around midday.

:ohhh::ohhh::ohhh::ohhh::ohhh::ohhh::ohhh::ohhh::ohhh::ohhh::ohhh:


shyt HAS BEEN ALL DAY.

Status overview | Down Detector


List of sites that currently down:

Box.com
Twitter.com
Schoology and Apex
Npmjs.com (Node Package Manager (major javascript package manager)
Roblox.com
Github.com
Spotify.com
Shopify.com
Freshbooks.com
Netflix.com (slow loading time)
The Boston Globe
The New York Times
PayPal
Theverge.com
Pinterest.com
Constantcontact.com
Playstation Network (PSN)
Revcontent.com
Fox News
Elder Scrolls Online
Starbucks rewards/gift cards
Braintree
Zoho CRM
xbox.com
Indeed.com
ActBlue
Grubhub
Kayak
Basecamp
Yammer
Ancersty.com
Mashable
Intercom.com
Disqus
Eventbrite
Wufoo.com
Iheart.com (iHeartRadio)
Business Insider
Imgur
NHL.com
Cleveland.com
Credit Karma
Squarespace Customer Sites
Atom.io
Wikia
Weebly
nimbleschedule.com
Okta
Big cartel
Zendesk.com
Blue Host
dailynews.com
Twillo
Intercom
donorschoose.org
Eve Online
Weather.com
PagerDuty
Recode
Wix Customer Sites
Speed Test
Salsify.com
Yelp
People.com
Wired.com
Genonebiology.com
Guardian.co.uk
HBO Now
youneedabudget.com
time.com
Qualtrics
BBC
Etsy
CNN
Urbandictionary
SBNation
Zillow.com
WSJ.com
Bill.com
WhatsApp.com

 

SalamiAttack

All Star
Joined
Oct 5, 2015
Messages
1,550
Reputation
6,415
Daps
4,923
Reppin
The Ancient City of Brooklyn
Twitter, Spotify and Reddit, and a huge swath of other websites were down or screwed up this morning. This was happening as hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s probably safe to assume that the two situations are related.


Update 12:28 PM EST: Dyn says it is investigating yet another attack, causing the same massive outages experienced this morning. Based on emails from Gizmodo readers, this new wave of attacks seems to be affecting the West Coast of the United States and Europe. It’s so far unclear how the two attacks are related, but the outages are very similar.

In order to understand how one DDoS attack could take out so many websites, you have to understand how Domain Name Servers (DNS) work. Basically, they act as the Internet’s phone book and facilitate your request to go to a certain webpage and make sure you are taken to the right place. If the DNS provider that handles requests for Twitter is down, well, good luck getting to Twitter. Some websites are coming back for some users, but it doesn’t look like the problem is fully resolved.
 

SalamiAttack

All Star
Joined
Oct 5, 2015
Messages
1,550
Reputation
6,415
Daps
4,923
Reppin
The Ancient City of Brooklyn
t_%20(7).jpg
 

ORDER_66

Demon Time coming 2024
Joined
Feb 2, 2014
Messages
146,675
Reputation
15,799
Daps
585,070
Reppin
Queens,NY
I was buggin wondering why Twitter wasnt working at all today... Something else big is probably going on and the hack is to hide it... :ufdup:
 

STEVE

MIami Beach on the check-in.
Joined
May 3, 2012
Messages
4,001
Reputation
730
Daps
9,013
Reppin
Miami Beach, FL
Yeah this fukked my work over for shared services today. I don't give a fukk either way. :ehh:
 

SalamiAttack

All Star
Joined
Oct 5, 2015
Messages
1,550
Reputation
6,415
Daps
4,923
Reppin
The Ancient City of Brooklyn
In a statement, Dyn said that this morning, October 21, Dyn received a global distributed denial of service (DDoS) attack on its DNS infrastructure on the east coast starting at around 7:10 a.m. ET (11:10 UTC).

“DNS traffic resolved from east coast name server locations are experiencing a service interruption during this time. Updates will be posted as information becomes available,” the company wrote.

DYN encouraged customers with concerns to check the company’s status page for updates and to reach out to its technical support team.

A DDoS is when crooks use a large number of hacked or ill-configured systems to flood a target site with so much junk traffic that it can no longer serve legitimate visitors.

DNS refers to Domain Name System services. DNS is an essential component of all Web sites, responsible for translating human-friendly Web site names like “example.com” into numeric, machine-readable Internet addresses. Anytime you send an e-mail or browse a Web site, your machine is sending a DNS look-up request to your Internet service provider to help route the traffic.

ANALYSIS
The attack on DYN comes just hours after DYN researcher Doug Madory presented a talk on DDoS attacks in Dallas, Texas at a meeting of the North American Network Operators Group (NANOG). Madory’s talk — available here on Youtube.com — delved deeper into research that he and I teamed up on to produce the data behind the story DDoS Mitigation Firm Has History of Hijacks.

That story (as well as one published earlier this week, Spreading the DDoS Disease and Selling the Cure) examined the sometimes blurry lines between certain DDoS mitigation firms and the cybercriminals apparently involved in launching some of the largest DDoS attacks the Internet has ever seen. Indeed, the record 620 Gbps DDoS against KrebsOnSecurity.com came just hours after I published the story on which Madory and I collaborated.

The record-sized attack that hit my site last month was quickly superseded by a DDoS against OVH, a French hosting firm that reported being targeted by a DDoS that was roughly twice the size of the assault on KrebsOnSecurity. As I noted in The Democratization of Censorship — the first story published after bringing my site back up under the protection of Google’s Project Shield — DDoS mitigation firms simply did not count on the size of these attacks increasing so quickly overnight, and are now scrambling to secure far greater capacity to handle much larger attacks concurrently.

The size of these DDoS attacks has increased so much lately thanks largely to the broad availability of tools for compromising and leveraging the collective firepower of so-called Internet of Things devices — poorly secured Internet-based security cameras, digital video recorders (DVRs) and Internet routers. Last month, a hacker by the name of Anna_Senpaireleased the source code for Mirai, a crime machine that enslaves IoT devices for use in large DDoS attacks. The 620 Gbps attack that hit my site last month was launched by a botnet built on Mirai, for example.

Interestingly, someone is now targeting infrastructure providers with extortion attacks and invoking the name Anna_senpai. According to a discussion thread started Wednesday on Web Hosting Talk, criminals are now invoking the Mirai author’s nickname in a bid to extort Bitcoins from targeted hosting providers.

“If you will not pay in time, DDoS attack will start, your web-services will
go down permanently. After that, price to stop will be increased to 5 BTC
with further increment of 5 BTC for every day of attack.

NOTE, i?m not joking.

My attack are extremely powerful now – now average 700-800Gbps, sometimes over 1 Tbps per second. It will pass any remote protections, no current protection systems can help.”

Let me be clear: I have no data to indicate that the attack on Dyn is related to extortion, to Mirai or to any of the companies or individuals Madory referenced in his talk this week in Dallas. But Dyn is known for publishing detailed writeups on outages at other major Internet service providers. Here’s hoping the company does not deviate from that practice and soon publishes a postmortem on its own attack.

Update, 10:22 a.m. ET: Dyn’s status page reports that all services are back to normal as of 13:20 UTC (9:20 a.m. ET). Fixed the link to Doug Madory’s talk on Youtube, to remove the URL shortener (which isn’t working because of this attack).

Update, 1:01 p.m. ET: Looks like the attacks on Dyn have resumed and this event is ongoing. This, from the Dyn status page:

This DDoS attack may also be impacting Dyn Managed DNS advanced services with possible delays in monitoring. Our Engineers are continuing to work on mitigating this issue.
OCT 21, 16:48 UTC

As of 15:52 UTC, we have begun monitoring and mitigating a DDoS attack against our Dyn Managed DNS infrastructure. Our Engineers are continuing to work on mitigating this issue.
 
Top