Much of the Internet was brought to a screeching halt Friday as a cyberattack on Request Moviesa company many had previously never heard of brought down many of the most popular online services, including Twitter and Spotify.
As of Friday afternoon, much of the drama was still playing out, though more details are slowly emerging. While the full story won't be clear for some time, if ever, we are now beginning to understand how this happened.
This particular attack targeted Dyn, a New Hampshire-based internet company that provides a service called domain name systems to some of the most-trafficked sites on the internet.
Domain name systems, or DNS, is a key part of the underlying infrastructure of the internet. Sometimes described as the "phonebook" or "GPS" of the internet, DNS enables browsers to connect with websites.
DNS enables browsers to connect with websites.
When you enter a URL, like twitter.com, into your browser, you understand that you are trying to access Twitter, but your computer can only point you to the correct website when the URL is translated into a specific numerical code called an IP address. DNS is the technology that translates URLs into IP addresses.
A particular service, like Twitter, usually isn't hosted in a single place. Much of its data is duplicated and stored on servers in several regions so, say, users in New York can access the site as quickly as those in Hong Kong. Thanks to DNS and DNS service companies, your browser knows which data is the best to access, and they also keep the data current.
By targeting Dyn, this attack disrupted that process so that your browser can't figure out where it needs to go when you enter the URL. This also makes it particularly challenging for affected sites since over the last few years they've handed DNS services almost completely over to third parties (in this case, Dyn).
Intel Security's Chief Technology Officer Steve Grobman compares it to losing GPS when you don't know where you're going. "If you think about going to the store but the GPS system was compromised and you had no way to navigate there, it doesn't really matter that — in theory — the store is open somewhere," he explains
In this case, the attackers used a technique called distributed denial of service (DDoS) in order to bring down Dyn, which in turn made Twitter and many other sites inaccessible. DDoS attacks, which are surprisingly simple and increasingly common, use huge networks of malicious software called botnets to bring down a specific service by overwhelming it. Think of how websites sometimes go down due to huge, often unexpected, volumes of traffic; DDoS attacks are designed to intentionally bring services down the same way.
Dyn has yet to elaborate on the source of the attacks, but security analysts at Flashpoint say they have linked the attack to previous ones that have used networks of connected devices, like "smart" refrigerators and other gadgets, to bring down websites. As Mashablepreviously noted, the so-called "Internet of Things," is an easy target for hackers to turn into botnets as many devices have lax security.
It could be some time before we find out the source of the attack and just how widespread its effects are. But one thing is clear, it sets a troubling precedent for how back-end providers like Dyn can be exploited. By targeting the companies that power the typically invisible processes that make up the backbone of the internet, hackers can bring down all kinds of services without ever touching those sites themselves.
With each attack, the security community is learning.
Still, Intel's Grobman says the outlook isn't entirely negative, noting that with each attack, the security community is learning.
"In some ways, this event is positive in educating people that it's possible for critical capabilities that we rely on for information exchange — entertainment, access to media — can become unavailable due to a cyberattack, and that cyberattack might not have to be directed toward the entity itself.
"There'a lot we can learn. Really recognizing that anything in the critical path that can be attacked are things we need to look at as part of building a comprehensive defense."
Topics Cybersecurity
Samsung to stop bundling chargers with phones next year, report saysA dinosaur picked a fight with the dictionary on Twitter and it was brutalBird denies that it received $5 millionA dinosaur picked a fight with the dictionary on Twitter and it was brutalUber's global reach grows as the company's ridesharing comes to TokyoHonest meme identifies the real villains in movies and TV showsJ.K. Rowling joins Beyonce on the Forbes 100 list of highest paid celebritiesNetflix's 'Down to Earth' is great if you love Zac Efron: ReviewOnePlus announces OnePlus Nord announcement, which will happen in ARJ.K. Rowling joins Beyonce on the Forbes 100 list of highest paid celebritiesFacebook criticized by Free Press for empty PR response to ad boycottiPhone users blame Apple Music for quickly draining batterySnake triumphantly slithers back into an aircon, rat in jawEnnio Morricone, legendary film composer for 'The Good, the Bad and the Ugly', dies at 91The internet bands together to fix woman's last video of her momUnfounded conspiracy theory accuses Wayfair of bonkers, PizzagateGrab is considering onSnake triumphantly slithers back into an aircon, rat in jawTwitter and Facebook respond to harsh new Hong Kong security lawElon Musk's Neuralink to share 'progress update' soon REI sale: Get up to 50% off camping and hiking gear Iowa vs. Illinois basketball livestreams: Game time, streaming deals Visit Australia's Great Barrier Reef without even leaving Twitter with live broadcast Nintendo Switch 2 release date delayed? The new rumored launch window Here are the 2024 SAG Awards winners Google's Gemini will soon be messaging you TikTok is mostly full of lurkers, study finds How to file taxes for free online Wordle today: The answer and hints for February 27 G20 summit shows Trump took U.S. from first to worst on climate change in under a year Turtles need to migrate across the airport and don't care if they delay flights at JFK The Great Barrier Reef is not 'in danger,' UNESCO says Elon Musk packs the best of SpaceX's latest landing in 20 Best of MWC 2024: The top phone, tablet, smart glasses, and more Here's how hot your city will be by the end of the century Better sleep deal: Get a Philips SmartSleep Wake EPA to actually hold 'red New reports link Meta and 'momfluencers' in perpetuating child exploitation online China's verdant 'forest city' will fight pollution with a million plants SpaceX sticks its second Falcon 9 rocket landing in 48 hours
1.8161s , 10132.53125 kb
Copyright © 2025 Powered by 【Request Movies】,Prosperous Times Information Network