The Latest in IT Security

DDos On Dyn Used Malicious TCP, UDP Traffic

27
Oct
2016
DDos On Dyn Used Malicious TCP, UDP Traffic

AR-161029847_converted

Domain Name Service (DNS) provider Dyn provided new details about the massive distributed denial-of-service (DDoS) attack on Oct. 21 it suffered that disrupted major websites including Okta, CNN, Pinterest, Reddit, and Twitter, and confirmed that the infamous Mirai botnet was the main culprit.

Scott Hilton, executive vice president of product for Dyn, in a blog post said the attackers employed masked TCP and UDP traffic via Port 53 in the attack as well as recursive DNS retry traffic, “further exacerbating its impact,” he said.

Read More

Leave a reply


Categories

TUESDAY, MAY 22, 2018

Featured

Archives

Latest Comments

Social Networks