Προς το περιεχόμενο

massive attacks!!!


pyro

Προτεινόμενες αναρτήσεις

--> http://forums.military.com/1/OpenTopic?a=tpc&s=78919038&f=409192893&m=4551982416

(mallwn giauto den mporousa na mpw x0es...hmm....)

 

MASSIVE DDOS ATTACKS ALL OVER U.S.

--------------------------------------------------------------------------------

We are monitoring massive Distributed Denial of Service attacks all over the U.S. tonight starting at around 11:30 PM CST. As many as 5 of the 13 root nameserver have been down, up to 10 with massive packet loss (xx%):

 

Internet Status to Root Name Servers

Date: Fri Jan 24 21:37:00 PST 2003

 

Place Address Packet Loss Time: Min/Avg/Max

Root b.root-servers.net 53% 25/40/48

Root c.root-servers.net 0% 82/82/82

Root e.root-servers.net 20% 16/29/33

Root f.root-servers.net 26% 17/27/32

Root h.root-servers.net 20% 91/101/108

Root i.root-servers.net 26% 190/199/205

Root j.root-servers.net 26% 81/91/96

Root k.root-servers.net 64% 172/188/201

Root l.root-servers.net 0% 5/5/6

Root m.root-servers.net 33% 160/171/205

GTLD b.gtld-servers.net 26% 52/63/67

GTLD c.gtld-servers.net 31% 85/93/95

GTLD d.gtld-servers.net 13% 88/100/103

GTLD f.gtld-servers.net 22% 38/50/57

GTLD i.gtld-servers.net 0% 198/200/203

GTLD k.gtld-servers.net 24% 90/100/105

GTLD l.gtld-servers.net 33% 128/138/171

 

 

All backbone providers are suffering major packet loss (XX%):

 

Place Address Packet Loss Time: Min/Avg/Max

AboveNet ns.above.net 28% 53/64/66

AGIS ns1.agis.net 26% 62/74/78

AlohaNet nuhou.aloha.net 35% 84/94/98

ANS ns.ans.net 26% 83/97/100

BBN-NearNet nic.near.net 28% 91/114/572

BBN-BARRnet ns1.barrnet.net 26% 16/26/32

Best ns.best.com 35% 79/89/95

Concentric nameserver.concentric.net 35% 18/31/56

CW ns.cw.net 28% 88/98/105

DIGEX ns.digex.net 31% 78/86/91

ENTER.NET dns.enter.net 28% 91/104/108

Epoch Internet ns1.hlc.net 33% 37/48/52

Flash net ns1.flash.net 17% 80/92/94

GetNet ns1.getnet.com 20% 40/52/56

GlobalCrossing name.roc.gblx.net 24% 85/97/104

GoodNet ns1.good.net 31% 83/92/97

GridNet grid.net 20% 80/92/101

IDT Net ns.idt.net 20% 91/104/121

Internex nic1.internex.net 26% 18/31/35

MCI ns.mci.net 22% 91/103/107

MindSpring itchy.mindspring.net 15% 75/88/106

NAP.NET ns2.nap.net 20% 73/85/94

PacBell ns1.pbi.net 0% 89/89/90

Primenet dns1.primenet.net 20% 31/41/45

PSI ns.psi.net 0% 82/84/160

RAINet ns.rain.net 31% 40/49/53

SAVVIS ns1.savvis.net 31% 88/99/102

SprintLink ns1.sprintlink.net 11% 15/27/35

UUNet,AlterNet auth00.ns.uu.net 26% 89/98/103

Verio-West ns0.verio.net 22% 31/42/47

Verio-East ns1.verio.net 22% 86/96/101

VISInet ceylon.visinet.ca 20% 102/116/188

MoonGlobal-ClubNET ns.clubnet.net 0% 0/1/2

MoonGlobal-Netway dns.nwc.net 4% 6/6/7

MoonGlobal-Netxactics verdi.netxactics.com 4% 6/6/7

InterWorld ns.interworld.net 0% 4/4/5

 

 

It's massive, no word on source yet. We are watching it closely.

 

Brad G

American Intelligence

www.americanintelligence.us

Συνδέστε για να σχολιάσετε
Κοινοποίηση σε άλλες σελίδες

WASHINGTON (AP) -- Traffic on the many parts of the Internet slowed dramatically for hours early Saturday, the apparent effects of a fast-spreading, virus-like infection that overwhelmed the world's digital pipelines and interfered with Web browsing and delivery of e-mail.

 

Sites monitoring the health of the Internet reported significant slowdowns globally. Experts said the electronic attack bore remarkable similarities to the "Code Red" virus during the summer of 2001 which also ground traffic to a halt on much of the Internet.

 

"It's not debilitating," said Howard Schmidt, President Bush's No. 2 cyber-security adviser. "Everybody seems to be getting it under control." Schmidt said the FBI's National Infrastructure Protection Center and private experts at the CERT Coordination Center were monitoring the attacks.

 

The virus-like attack, which began about 12:30 a.m. EST, sought out vulnerable computers on the Internet to infect using a known flaw in popular database software from Microsoft Corp., called "SQL Server 2000." But the attacking software code was scanning for victim computers so randomly and so aggressively -- sending out thousands of probes each second -- that it overwhelmed many Internet data pipelines.

 

"This is like Code Red all over again," said Marc Maiffret, an executive with eEye Digital Security, whose engineers were among the earliest to study samples of the attack software. "The sheer number of attacks is eating up so much bandwidth that normal operations can't take place."

 

"The impact of this worm was huge," agreed Ben Koshy of W3 International Media Ltd., which operates thousands of Web sites from its computers in Vancouver. "It's a very significant attack."

 

Koshy added that, about six hours after the attack, commercial Web sites that had been overwhelmed were starting to come back online as engineers began effectively blocking the malicious data traffic.

 

"People are recovering from it," Koshy said.

 

Symantec Corp., an antivirus vendor, estimated that at least 22,000 systems were affected worldwide.

 

"Traffic itself seems to have leveled off a little bit, so likely only so many systems are exposed out there," said Oliver Friedrichs, senior manager with Symantec Security Response. The attacking software, technically known as a worm, was overwhelming Internet traffic-directing devices known as routers.

 

"The Internet is still usable, but we're definitely receiving reports from some of our customers who have had it affect their routers specifically," Friedrichs said.

 

The attack sought to take advantage of a software flaw discovered by researchers in July 2002 that permits hackers to seize control of corporate database servers. Microsoft deemed the problem "critical" and offered a free repairing patch, but it was impossible to know how many computer administrators applied the fix.

 

"People need to do a better job about fixing vulnerabilities," Schmidt said.

 

The latest attack was likely to revive debate within the technology industry about the need for an Internet-wide monitoring center, which the Bush administration has proposed. Some Internet industry executives and lawyers said they would raise serious civil liberties concerns if the U.S. government, not an industry consortium, operated such a powerful monitoring center

 

 

 

from cnn

 

Συνδέστε για να σχολιάσετε
Κοινοποίηση σε άλλες σελίδες

Αρχειοθετημένο

Αυτό το θέμα έχει αρχειοθετηθεί και είναι κλειστό για περαιτέρω απαντήσεις.

  • Δημιουργία νέου...