海角大神

How Friday's cyberattack shut down Netflix, Twitter, and Spotify

Behind the attack was the Mirai botnet, which bombarded Dyn DNS company's servers with millions of requests, preventing access to many major sites.

|
Jim Cole/AP
This photo shows Dyn, a New Hampshire internet service company, in the old mill section of the city, Friday Oct. 21, 2016 in Manchester, N.H. Cyberattacks on a key internet firm repeatedly disrupted the availability of popular websites across the United States Friday, according to analysts and company officials. The White House described the disruption as malicious.

On Friday morning, internet users all over the United States attempted to log in to Twitter and Netflix, only to find that a massive cyberattack rendered them unable to connect to some of the world's most popular websites.聽Despite fixing the issue, the sites went down again later in the day, victim to another attack. After a third hit, the problem was finally brought under control.

While the identity of the attackers is still unknown, experts have figured out how they attack was carried out. Taking advantage of a botnet of internet-enabled devices, possibly with publicly available source code, hackers were able to clog up traffic to major websites, effectively shutting out human users with an army of automated bots. The scale and success of the attack is causing many companies and organizations to reevaluate their approach to protect websites and consumers from this kind of vulnerability in the future.

The sites that went down, which included CNN and The New York Times, were all customers of Dyn DNS Company, a company that specializes in online infrastructure. One of the company's main functions is to translate human-readable inputs into IP addresses, which can then be used to route online traffic in an efficient manner. But this function was disrupted on Friday when hackers launched a聽distributed denial of service (DDoS) attack on DNS servers. As 海角大神's Story Hinckley explained:

If聽it weren鈥檛 for DNS, internet users would have to聽know the IP address聽for a site (such as 216.168.224.70) instead of the simple domain name (such as csmonitor.com).聽

And a DDoS attack effectively breaks down a server鈥檚 searching capabilities by overloading a system with server requests.聽

In order to overload these servers, hackers turned to a malware program known as Mirai. The program takes over network-enabled items such as CCTV cameras, DVRs, and even innocuous household items, networking them together into a botnet to launch a barrage of requests at a target. While computers and phones have more sophisticated security equipment to resist this sort of takeover, many Internet of Things (IoT) devices do not have these protections, and can be easily taken over by hackers.

"IoT security has been horribly flawed ever since it first became a thing, largely because of the pace that new products have to go to market, and the fact that designing security聽is seen by vendors as ','" Casey Ellis, CEO of聽Bugcrowd, a San Francisco-based computer security service, told the Lansing State Journal.

With anything from TVs to refrigerators to toasters being created with the capability to connect to a network, these low-security IP addresses have become a tempting target for cybercriminals.聽Any device with an internet connection has an IP address that can be used by Mirai.聽

"It is just until attackers find a way to profit from attacking IoT devices," warned a 2015 report from Symantec, a technology company specializing in security. "This may lead to connected toasters that mine cryptocurrencies or smart TVs that are held ransom by malware. Unfortunately, the current state of IoT security does not make it difficult for attackers to compromise these devices once they see the benefit of doing so."

If an attack like this through IoT devices was inevitable, it was made imminent when a hacker known as Anna_Senpai聽released Mirai's source code , according to Fast Company. Anna_Senpai, the likely creator of the program, likely released the code in order to avoid being the only one found with the code if law enforcement comes calling. This is a common tactic for hackers who suspect they , according to Krebs on Security. In this case, it also makes it difficult to determine whether the Friday attack was orchestrated by the person or persons behind Anna_Senpai, or by others who were able to copy the Mirai source code.

The attack comes amid the President Obama's聽accusations that Russian hacking聽has taken place in an聽attempt to influence the outcome of the upcoming 聽US presidential election. With increasingly sophisticated and consequential cyberattacks on the rise in an online world, commitment to cybersecurity is swiftly moving to the forefront of both federal and private concerns.

"We're proud of the way the Dyn team and the internet community of which we're a part came together ," reads a Saturday statement from the company on Saturday. "Dyn is collaborating with the law enforcement community, other service providers, and members of the internet community who have helped and offered to help. The number and type of attacks, the duration, the scale, and the complexity of these attacks are all on the rise."

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to How Friday's cyberattack shut down Netflix, Twitter, and Spotify
Read this article in
/Technology/2016/1023/How-Friday-s-cyberattack-shut-down-Netflix-Twitter-and-Spotify
QR Code to Subscription page
Start your subscription today
/subscribe