DDOS Attack Story: "The Digital Extortionists

In summary, a security story was shared that is similar to "The Cuckoo's Egg" by Clifford Stoll, but involves a DDOS attack. The story discusses the attack and how the attackers were able to coordinate so many machines in a single attack. It raises concerns about the security measures in place and what can be done to address these types of attacks. Suggestions include using a more secure operating system and being properly prepared for such attacks.
  • #1
dduardo
Staff Emeritus
1,905
3
I found a security story that is similar to "The Cuckoo's Egg" by Clifford Stoll, but involves a DDOS attack. It is somewhat long, but definitely a good read.

http://www.csoonline.com/read/050105/extortion.html
 
Last edited by a moderator:
Computer science news on Phys.org
  • #2
Saw that posted in cola the other day. Interesting story. Nice that they were able to beat the attack off. However, it does not bode well if attackers are already able to coordinate so many machines in a single attack. Something seriously needs to be done to address that.
 
  • #3
what can be done?
 
  • #4
TsunamiJoe said:
what can be done?

Burning every copy of windows in existence, nuking Redmond and making everyone use a proper operating system.
 
  • #5
TsunamiJoe said:
what can be done?
this story is a clear case of the company not being prepared for such an attack. Its just like one of those amoured bank vehicles (they draw attention) and if you are drawing attention then you should have security.

If you want to run windows for a server then have someone that knows everything about it because its one of the easier OSs to break into.
 

Related to DDOS Attack Story: "The Digital Extortionists

1. What is a DDOS attack?

A DDOS (Distributed Denial of Service) attack is a type of cyber attack where multiple compromised systems, often infected with malware, are used to flood a targeted website or server with excessive traffic. This overwhelms the system and causes it to crash or become inaccessible to legitimate users.

2. How do DDOS attacks work?

DDOS attacks work by overwhelming a system with more traffic than it can handle. This can be done in various ways, such as flooding it with excessive amounts of data, sending a large number of requests to the server, or exploiting vulnerabilities in the system to make it crash.

3. Who are the perpetrators of DDOS attacks?

The perpetrators of DDOS attacks are often cyber criminals or hackers who aim to disrupt or damage a website or server for financial gain, revenge, or other malicious purposes. In some cases, DDOS attacks may also be carried out by political groups or activists as a form of protest or sabotage.

4. How can individuals and organizations protect themselves from DDOS attacks?

To protect against DDOS attacks, individuals and organizations can implement various measures such as using firewalls, intrusion detection systems, and content delivery networks. It is also important to regularly update and patch systems to prevent vulnerabilities that can be exploited by attackers.

5. What are the potential consequences of a DDOS attack?

The consequences of a DDOS attack can be severe and can vary depending on the target and the duration of the attack. These can include financial losses, reputational damage, legal consequences, and disruption of services for legitimate users. In some cases, the consequences can also be life-threatening, such as in the case of attacks on critical infrastructure like hospitals or transportation systems.

Similar threads

Replies
10
Views
2K
  • Computing and Technology
Replies
25
Views
3K
  • Computing and Technology
Replies
4
Views
3K
  • Science Fiction and Fantasy Media
Replies
7
Views
2K
  • STEM Academic Advising
Replies
4
Views
1K
  • Sci-Fi Writing and World Building
Replies
7
Views
2K
  • General Discussion
Replies
24
Views
6K
  • STEM Academic Advising
Replies
5
Views
1K
  • General Discussion
Replies
13
Views
4K
  • Art, Music, History, and Linguistics
Replies
1
Views
1K
Back
Top