DNS Made Easy has restored services following a vicious denial of service that peaked at 50Gbps on Saturday. The identity of the perpetrators and their motives remain unclear. One possible scenario is that hackers with a grudge against the site hired a botnet to swamp DNS Made Easy with useless traffic. A blow-by-blow account …
My best guess is that they found themselves accidentally providing DNS services to the bad guys, then terminated them for breach of TOS or something. The DDOS might just be an act of revenge.
Probably used as a test-run/advertisement of capacity by some gang of tosspots. I've been getting a lot of botnet traffic here and at another location I administer, so there's something in the air.
Is there an advert from a bunch called...
...DDOS Made Easy?
DDOS MADE EASY
DDOS Made Easy, actually the name of the attackers business should be that. Since we have been receiving this attack for the last 3 months (granted the highest we seen it go was 30Gbps). I'll share some of the info it's a for-hire-ddos attack. You pay a fee, you receive a nice little software that manages a certain size of the botnet and you attack as you please.
I am glad to see it is finally getting some media attention. As we have been fruitless for quite a while now trying to get this botnet out of commission.
DDOS MADE EASY for you :)
- Product Round-up Smartwatch face off: Pebble, MetaWatch and new hi-tech timepieces
- Geek's Guide to Britain The bunker at the end of the world - in Essex
- FLABBER-JASTED: It's 'jif', NOT '.gif', says man who should know
- If you've bought DRM'd film files from Acetrax, here's the bad news
- Microsoft reveals Xbox One, the console that can read your heartbeat