Increase Explicitly
Does this mean there will be more porn or that they will become sexually aroused by DDoS?
JPMorgan Chase's website went kaput yesterday when the bank became the latest US financial institution to find itself on the business end of a distributed denial-of-service assault. Visitors to chase.com were shown a "website temporarily down" message on the front page, although the bank's mobile apps were said to be working …
".....They would just shoot the directors of the Bank" More likely they or their puppets in Hezbollah would try and blow them up, though their more recent attempts at bombings have been a bit slap-dash:
http://www.nbcnews.com/id/46416121/ns/world_news-mideast_n_africa/t/thailand-iranians-planned-terror-attack-israeli-diplomats/#.UUCksjfj7rQ
Much easier for them to sit safely at home and throw DDoS attacks at banks - takes no real skillz and very little kit required, so right up the Iranians' street, and they don't risk blowing their own legs off!
What is funny is, there were some highly regarded names originally running Iran's cyberwarfare program.
DDOS was not a bit on their resume, they were far more sophisticated.
So, interesting developments, considering the name is one of Iran's cyber warfare units.
Indeed, fascinating.
And ill targeted. Though, YouTube's removal is also rather fascinating.
Meanwhile, I managed to handle my father's finances quite well during the attack on Wells Fargo. A bank from hell of interesting fees.
You would think that since the practice of DDoS is so common, that the victims of repeated attacks (Banks, Financial/Government institutions, etc) would have already made accommodations for these attacks and be ready to counter them on a moments notice.
I assume that the range of IP's that the attacks are coming from are somewhat obvious and the service provider (who should already be seeing the huge traffic spike) could do a little creative re-routing to a blackhole?
Is it possible to re-route that DDoS traffic back at itself? That would be helpful!
Well, with some creative work and bandwidth, it'd be possible to redirect it back. It'd be a simple matter of header changing. However, the originating packet can be forged and leave you attacking an innocent party, such as the true target of an attack.
That said, one can filter out various DDOS attacks, with modest risk to interruption of services to clients. However, the router has to still handle the requests. Something potentially damaging in and of itself.
Spend 20 mins on the Big G looking for botnets for hire, out of those a fair few will actually come up with the goods.
Job done
Yeah the majority are scams, but some wont be..
Same IP? Not even close.
I am sure a country has far more impressive ways to perform this task. That said, the target is hardly worthy of the time and effort, unless its being used as a training excersise.