Much of the Internet was brought to a screeching halt Friday as a cyberattack on OKASANNOANARU-02a company many had previously never heard of brought down many of the most popular online services, including Twitter and Spotify.
As of Friday afternoon, much of the drama was still playing out, though more details are slowly emerging. While the full story won't be clear for some time, if ever, we are now beginning to understand how this happened.
This particular attack targeted Dyn, a New Hampshire-based internet company that provides a service called domain name systems to some of the most-trafficked sites on the internet.
Domain name systems, or DNS, is a key part of the underlying infrastructure of the internet. Sometimes described as the "phonebook" or "GPS" of the internet, DNS enables browsers to connect with websites.
DNS enables browsers to connect with websites.
When you enter a URL, like twitter.com, into your browser, you understand that you are trying to access Twitter, but your computer can only point you to the correct website when the URL is translated into a specific numerical code called an IP address. DNS is the technology that translates URLs into IP addresses.
A particular service, like Twitter, usually isn't hosted in a single place. Much of its data is duplicated and stored on servers in several regions so, say, users in New York can access the site as quickly as those in Hong Kong. Thanks to DNS and DNS service companies, your browser knows which data is the best to access, and they also keep the data current.
By targeting Dyn, this attack disrupted that process so that your browser can't figure out where it needs to go when you enter the URL. This also makes it particularly challenging for affected sites since over the last few years they've handed DNS services almost completely over to third parties (in this case, Dyn).
Intel Security's Chief Technology Officer Steve Grobman compares it to losing GPS when you don't know where you're going. "If you think about going to the store but the GPS system was compromised and you had no way to navigate there, it doesn't really matter that — in theory — the store is open somewhere," he explains
In this case, the attackers used a technique called distributed denial of service (DDoS) in order to bring down Dyn, which in turn made Twitter and many other sites inaccessible. DDoS attacks, which are surprisingly simple and increasingly common, use huge networks of malicious software called botnets to bring down a specific service by overwhelming it. Think of how websites sometimes go down due to huge, often unexpected, volumes of traffic; DDoS attacks are designed to intentionally bring services down the same way.
Dyn has yet to elaborate on the source of the attacks, but security analysts at Flashpoint say they have linked the attack to previous ones that have used networks of connected devices, like "smart" refrigerators and other gadgets, to bring down websites. As Mashablepreviously noted, the so-called "Internet of Things," is an easy target for hackers to turn into botnets as many devices have lax security.
It could be some time before we find out the source of the attack and just how widespread its effects are. But one thing is clear, it sets a troubling precedent for how back-end providers like Dyn can be exploited. By targeting the companies that power the typically invisible processes that make up the backbone of the internet, hackers can bring down all kinds of services without ever touching those sites themselves.
With each attack, the security community is learning.
Still, Intel's Grobman says the outlook isn't entirely negative, noting that with each attack, the security community is learning.
"In some ways, this event is positive in educating people that it's possible for critical capabilities that we rely on for information exchange — entertainment, access to media — can become unavailable due to a cyberattack, and that cyberattack might not have to be directed toward the entity itself.
"There'a lot we can learn. Really recognizing that anything in the critical path that can be attacked are things we need to look at as part of building a comprehensive defense."
Topics Cybersecurity
The entire sports world is also mocking Trump administration's 'alternative facts'The LGBTQ community is coming to march and werk on WashingtonA 'Devil Wears Prada' musical was just announced and Elton John is writing the musicYarn shop that attacked 'vile' Pussyhat Project is getting flooded with bad Yelp reviewsUPDATE: FBI Director James Comey is no longer coming to Austin to narc on your SXSW funNvidia and AMD Keep Dropping GPU Prices After New Product Launches FlopAll the times the former president of Mexico shut down Trump's 'f*cking wall'This country is raising $600 million to counter Trump's antiNYT Connections hints and answers for June 23: Tips to solve 'Connections' #743.American Airlines is ditching seatback screens in its new planesGoogle I/O 2017 dates are revealed by this freakishly hard puzzleTrump capping a pen with his tiny hands gets a huge Photoshop battleNvidia and AMD Keep Dropping GPU Prices After New Product Launches FlopTwitter accounts form digital army in resistance against TrumpGreat white shark gracefully photobombs 10ABC News used a fake image of Trump in the White House and is anything real?In their own words: What 'Invasion Day' means to a rural Indigenous communityEngineers outfit dragonflies with hybrid drone techJournalists across the country are using a Slack channel to tackle TrumpEverything you thought you knew about Q from James Bond is wrong Best Cyber Monday Roomba deals 2023 Imagining a Free Palestine by George Abraham Something We All Can Agree On: The Moon by The Paris Review Coveting Cartier Necklaces and Celtic Torques at the Met by Julia Berick 'The Idol': How to use ice cubes during sex Letter to a Stranger by Remedios Varo Redux: The Famous Sideshow by The Paris Review Between Two Languages: An Interview with Yoko Tawada by Alexandra Pereira We Tell Ourselves Stories: Didion’s “White Album” Takes to the Stage by Daniel Penny The Celestial Memory Palace by Aysegul Savas The Shocking, Subversive Endings of Taeko Kōno’s Stories by Gabe Habash Cyber Monday headphone deals still live: Bose, Apple, Sony, and more Redux: The Old Juices Flowing by The Paris Review The Faces of Ferrante by Miranda Popkey Redux: The Shopping Mall of Loss by The Paris Review The Sight of Dawn by Nina MacLaughlin Best Cyber Monday Roomba deals at Amazon 2023 The Touch of Dawn by Nina MacLaughlin Does ChatGPT flirting translate into good dates? Fran Lebowitz Doesn’t Dance Anymore by Vince Aletti
2.3362s , 10134.4140625 kb
Copyright © 2025 Powered by 【OKASANNOANARU-02】,Warmth Information Network