DNS Made Easy has restored services following a vicious denial of service that peaked at 50Gbps on Saturday. The identity of the perpetrators and their motives remain unclear. One possible scenario is that hackers with a grudge against the site hired a botnet to swamp DNS Made Easy with useless traffic. A blow-by-blow account …
My best guess is that they found themselves accidentally providing DNS services to the bad guys, then terminated them for breach of TOS or something. The DDOS might just be an act of revenge.
Probably used as a test-run/advertisement of capacity by some gang of tosspots. I've been getting a lot of botnet traffic here and at another location I administer, so there's something in the air.
Is there an advert from a bunch called...
...DDOS Made Easy?
DDOS MADE EASY
DDOS Made Easy, actually the name of the attackers business should be that. Since we have been receiving this attack for the last 3 months (granted the highest we seen it go was 30Gbps). I'll share some of the info it's a for-hire-ddos attack. You pay a fee, you receive a nice little software that manages a certain size of the botnet and you attack as you please.
I am glad to see it is finally getting some media attention. As we have been fruitless for quite a while now trying to get this botnet out of commission.
DDOS MADE EASY for you :)
- One HUNDRED FAMOUS LADIES exposed NUDE online
- Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
- China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
- Apple to devs: NO slurping users' HEALTH for sale to Dark Powers
- Rubbish WPS config sees WiFi router keys popped in seconds