pyro Δημοσ. 25 Ιανουαρίου 2003 Share Δημοσ. 25 Ιανουαρίου 2003 --> http://forums.military.com/1/OpenTopic?a=tpc&s=78919038&f=409192893&m=4551982416 (mallwn giauto den mporousa na mpw x0es...hmm....) MASSIVE DDOS ATTACKS ALL OVER U.S. -------------------------------------------------------------------------------- We are monitoring massive Distributed Denial of Service attacks all over the U.S. tonight starting at around 11:30 PM CST. As many as 5 of the 13 root nameserver have been down, up to 10 with massive packet loss (xx%): Internet Status to Root Name Servers Date: Fri Jan 24 21:37:00 PST 2003 Place Address Packet Loss Time: Min/Avg/Max Root b.root-servers.net 53% 25/40/48 Root c.root-servers.net 0% 82/82/82 Root e.root-servers.net 20% 16/29/33 Root f.root-servers.net 26% 17/27/32 Root h.root-servers.net 20% 91/101/108 Root i.root-servers.net 26% 190/199/205 Root j.root-servers.net 26% 81/91/96 Root k.root-servers.net 64% 172/188/201 Root l.root-servers.net 0% 5/5/6 Root m.root-servers.net 33% 160/171/205 GTLD b.gtld-servers.net 26% 52/63/67 GTLD c.gtld-servers.net 31% 85/93/95 GTLD d.gtld-servers.net 13% 88/100/103 GTLD f.gtld-servers.net 22% 38/50/57 GTLD i.gtld-servers.net 0% 198/200/203 GTLD k.gtld-servers.net 24% 90/100/105 GTLD l.gtld-servers.net 33% 128/138/171 All backbone providers are suffering major packet loss (XX%): Place Address Packet Loss Time: Min/Avg/Max AboveNet ns.above.net 28% 53/64/66 AGIS ns1.agis.net 26% 62/74/78 AlohaNet nuhou.aloha.net 35% 84/94/98 ANS ns.ans.net 26% 83/97/100 BBN-NearNet nic.near.net 28% 91/114/572 BBN-BARRnet ns1.barrnet.net 26% 16/26/32 Best ns.best.com 35% 79/89/95 Concentric nameserver.concentric.net 35% 18/31/56 CW ns.cw.net 28% 88/98/105 DIGEX ns.digex.net 31% 78/86/91 ENTER.NET dns.enter.net 28% 91/104/108 Epoch Internet ns1.hlc.net 33% 37/48/52 Flash net ns1.flash.net 17% 80/92/94 GetNet ns1.getnet.com 20% 40/52/56 GlobalCrossing name.roc.gblx.net 24% 85/97/104 GoodNet ns1.good.net 31% 83/92/97 GridNet grid.net 20% 80/92/101 IDT Net ns.idt.net 20% 91/104/121 Internex nic1.internex.net 26% 18/31/35 MCI ns.mci.net 22% 91/103/107 MindSpring itchy.mindspring.net 15% 75/88/106 NAP.NET ns2.nap.net 20% 73/85/94 PacBell ns1.pbi.net 0% 89/89/90 Primenet dns1.primenet.net 20% 31/41/45 PSI ns.psi.net 0% 82/84/160 RAINet ns.rain.net 31% 40/49/53 SAVVIS ns1.savvis.net 31% 88/99/102 SprintLink ns1.sprintlink.net 11% 15/27/35 UUNet,AlterNet auth00.ns.uu.net 26% 89/98/103 Verio-West ns0.verio.net 22% 31/42/47 Verio-East ns1.verio.net 22% 86/96/101 VISInet ceylon.visinet.ca 20% 102/116/188 MoonGlobal-ClubNET ns.clubnet.net 0% 0/1/2 MoonGlobal-Netway dns.nwc.net 4% 6/6/7 MoonGlobal-Netxactics verdi.netxactics.com 4% 6/6/7 InterWorld ns.interworld.net 0% 4/4/5 It's massive, no word on source yet. We are watching it closely. Brad G American Intelligence www.americanintelligence.us Συνδέστε για να σχολιάσετε Κοινοποίηση σε άλλες σελίδες άλλες επιλογές
angelos0 Δημοσ. 25 Ιανουαρίου 2003 Share Δημοσ. 25 Ιανουαρίου 2003 WASHINGTON (AP) -- Traffic on the many parts of the Internet slowed dramatically for hours early Saturday, the apparent effects of a fast-spreading, virus-like infection that overwhelmed the world's digital pipelines and interfered with Web browsing and delivery of e-mail. Sites monitoring the health of the Internet reported significant slowdowns globally. Experts said the electronic attack bore remarkable similarities to the "Code Red" virus during the summer of 2001 which also ground traffic to a halt on much of the Internet. "It's not debilitating," said Howard Schmidt, President Bush's No. 2 cyber-security adviser. "Everybody seems to be getting it under control." Schmidt said the FBI's National Infrastructure Protection Center and private experts at the CERT Coordination Center were monitoring the attacks. The virus-like attack, which began about 12:30 a.m. EST, sought out vulnerable computers on the Internet to infect using a known flaw in popular database software from Microsoft Corp., called "SQL Server 2000." But the attacking software code was scanning for victim computers so randomly and so aggressively -- sending out thousands of probes each second -- that it overwhelmed many Internet data pipelines. "This is like Code Red all over again," said Marc Maiffret, an executive with eEye Digital Security, whose engineers were among the earliest to study samples of the attack software. "The sheer number of attacks is eating up so much bandwidth that normal operations can't take place." "The impact of this worm was huge," agreed Ben Koshy of W3 International Media Ltd., which operates thousands of Web sites from its computers in Vancouver. "It's a very significant attack." Koshy added that, about six hours after the attack, commercial Web sites that had been overwhelmed were starting to come back online as engineers began effectively blocking the malicious data traffic. "People are recovering from it," Koshy said. Symantec Corp., an antivirus vendor, estimated that at least 22,000 systems were affected worldwide. "Traffic itself seems to have leveled off a little bit, so likely only so many systems are exposed out there," said Oliver Friedrichs, senior manager with Symantec Security Response. The attacking software, technically known as a worm, was overwhelming Internet traffic-directing devices known as routers. "The Internet is still usable, but we're definitely receiving reports from some of our customers who have had it affect their routers specifically," Friedrichs said. The attack sought to take advantage of a software flaw discovered by researchers in July 2002 that permits hackers to seize control of corporate database servers. Microsoft deemed the problem "critical" and offered a free repairing patch, but it was impossible to know how many computer administrators applied the fix. "People need to do a better job about fixing vulnerabilities," Schmidt said. The latest attack was likely to revive debate within the technology industry about the need for an Internet-wide monitoring center, which the Bush administration has proposed. Some Internet industry executives and lawyers said they would raise serious civil liberties concerns if the U.S. government, not an industry consortium, operated such a powerful monitoring center from cnn Συνδέστε για να σχολιάσετε Κοινοποίηση σε άλλες σελίδες άλλες επιλογές
Toufas Δημοσ. 27 Ιανουαρίου 2003 Share Δημοσ. 27 Ιανουαρίου 2003 oi koreates ta kanoune paides... rip dalnet Συνδέστε για να σχολιάσετε Κοινοποίηση σε άλλες σελίδες άλλες επιλογές
Dvs Δημοσ. 29 Ιανουαρίου 2003 Share Δημοσ. 29 Ιανουαρίου 2003 www.american-intelligence.us <-- kalo gia na fainetai alithino! (egina kai ligo kakos:p) Συνδέστε για να σχολιάσετε Κοινοποίηση σε άλλες σελίδες άλλες επιλογές
Προτεινόμενες αναρτήσεις
Αρχειοθετημένο
Αυτό το θέμα έχει αρχειοθετηθεί και είναι κλειστό για περαιτέρω απαντήσεις.