Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Massive DDoS Assault Brings Down Websites UK2.NET Hosted

On the midnight of April 25, 2012, UK2.NET the web-hosting provider in UK confronted a DDoS (Distributed Denial-of-Service) assault, which effectively deactivated its clients' websites, published theregister.co.uk dated April 26, 2012.

Martin Baker, Chief Operating Officer of UK2.NET, surprised with the scale of assault, stated that it was the first time it had happened. Theregister.co.uk published this.

Baker explained that the company's servers providing the Domain Name Systems confronted a botnet assault. Clients found the assault sporadically as they realized visitors had websites alternatively become accessible and non-accessible. That was based on the moment they chose to send requests to be able to view different websites. Further, UK2.NET found that 10m or so seemingly distinct Internet Protocols aimed assaults on the company.

The assault spree reached its highest point at around 12 in the night of April 25, 2012 albeit the problem with the online sites began earlier during the day, UK2.NET's clients reported.

The company, which was able to find the origin of the DDoS i.e. the specific Internet Protocol addresses used for the attack, therefore managed to adopt mitigation measures and subsequently push the problem off its system within the next three hours, Baker described.

And as per analysts, UK2.NET, for which DDoS assaults aren't new, a better arrangement in informing their clients about such problems was expected of the company. The Twitter website giving the status of UK2.NET, displayed just 2 latest messages on April 26, 2012 in addition to just another tweet notifying 3 clients regarding the problem. This latter tweet uncommonly led clients onto the status page. The last message there stated that the problem of interrupted server access no longer existed, while just a few domains that linked up with it, were affected.

Eventually, an established DDoS safeguard company commented that organizations could maintain a "playbook," which would be a rehearsal or verification plan delineating the person from amongst the employees who'd tackle any DDoS assault that erupted, along with a thorough method for communicating clients. Besides, partnerships between Web-hosts and DDoS lessening companies could assist in maintaining safe client websites, the company added.

Related article: McAfee Alerts Windows about Accessibility Hole in Vista

» SPAMfighter News - 5/4/2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next