GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Porn Site Feud Spawns New DNS Attack (https://gfy.com/showthread.php?t=888691)

AliGbone 02-18-2009 12:30 PM

Porn Site Feud Spawns New DNS Attack
 
http://www.pcworld.com/businesscente...ns_attack.html

Porn Site Feud Spawns New DNS Attack :321GFY


A scrap between two pornographic Web sites turned nasty when one figured out how to take down the other by exploiting a previously unknown quirk in the Internet's Domain Name System (DNS).

The attack is known as DNS Amplification. It has been used sporadically since December, but it started getting talked about last month when ISPrime, a small New York Internet service provider, started getting hit hard with what's known as a distributed denial of service (DDOS) attack. The attack was launched by the operator of a pornographic Web site who was trying to shut down a competitor, hosted on ISPrime's network, according to Phil Rosenthal, the company's chief technology officer.

The attack on ISPrime started on the morning of Sunday, Jan. 18. It lasted about a day, but what was remarkable was that a relatively small number of PCs were able to generate a very large amount of traffic on the network.

One day later, a similar attack followed, lasting three days. Before ISPrime was able to filter the unwanted traffic, attackers were able to use up about 5GB/second of the company's bandwidth,

With a bit of work, Rosenthal's staff was able to filter out the hostile traffic, but in an e-mail interview he said that the attack "represents a disturbing trend in the sophistication of denial of service attacks."

According to Don Jackson, director of threat intelligence at security vendor SecureWorks, we may soon see a lot more of these DNS Amplification attacks. Late last week, the botnet operators, who rent out their networks of hacked computers to the highest bidder, started adding custom DNS Amplification tools to their networks.

"Everyone's picked it up now," he said. "The next big DDOS on some former Soviet republic, you'll see this mentioned, I'm sure."

One of the things that makes a DNS amplification attack particularly nasty is the fact that by sending a very small packet to a legitimate DNS server, say 17 bytes, the attacker can then trick the server into sending a much larger packet -- about 500 bytes --- to the victim of the attack. By spoofing the source of the packet, the attacker can direct it at specific parts of his victim's network.

Jackson estimates that the 5GB/second attack against ISPrime was achieved with just 2,000 computers, which sent out spoofed packets to thousands of legitimate nameservers, all of which started flooding the ISPrime network. ISPrime's Rosenthal says that about 750,000 legitimate DNS servers were used in the attack on his network.

Earlier this week, SecureWorks produced a technical analysis of the DNS Amplification attack.

The attack is generating a lot of discussion amongst DNS experts, according to Duane Wessels, program manager with DNS-OARC (Operations Analysis and Research Center), based in Redwood City, California.

"The worry is that this kind of attack could be used on more high-profile targets," he said.

One of the things that makes the attack particularly nasty is that it's very hard to protect against.

"As far as I know, the only real defense you have is to ask your upstream provider to filter [the malicious traffic]," he said. "It's not something the victim can do by themselves. They need cooperation from the provider."

The DNS system, a kind of directory assistance service for the Internet, has come under increased scrutiny over the past year, when hacker Dan Kaminsky discovered a serious flaw in the system. That flaw, which has now been patched by makers of DNS software, could be exploited to silently redirect Internet traffic to malicious computers without the victim's knowledge.

DNS-OARC has published some information on how to prevent BIND DNS servers from being used in one of these attacks. Microsoft was unable to immediately provide information on how to mitigate this particular attack on its own products, but its guidance on deploying secure DNS servers can be found here.


Interestin newz feed. Betterz make sure your host got the right protection! Times is getting tough!

AlienQ - BANNED FOR LIFE 02-18-2009 12:40 PM

So who is gonna target the thieving tubesites?

Fletch XXX 02-18-2009 12:41 PM

OMG someone DDosed someone else?

someone call Wired, have they heard of this tactic yet????

nation-x 02-18-2009 12:46 PM

I think this same thing happened to NatNet as well

undersoul 02-18-2009 12:50 PM

it was a pretty big attack , 5GB/sec. plus the fear of similar style attacks in the future. scary shit.

WiredGuy 02-18-2009 12:51 PM

So what was the porn sites involved?
WG

Tom_PM 02-18-2009 12:53 PM

Quote:

Originally Posted by WiredGuy (Post 15517929)
So what was the porn sites involved?
WG

Yeah, and which one was the attacker?

Fletch XXX 02-18-2009 12:55 PM

guys come on, its the same as the cyber security companies.

this is just put out there by the same people they quote in the article.... i doubt the attack occured. Really.

all you need to read is:
Quote:

According to Don Jackson, director of threat intelligence at security vendor SecureWorks, we may soon see a lot more of these DNS Amplification attacks.
to know its mostly horse shit.... like all the other press releases security related.

"Beware the new KillAss virus, buy our software to stop it."

over and over and over

DWB 02-18-2009 09:00 PM

The same attacker has attacked:

PerfectLadyboys.com, LadyboyDolls.com, LadyboyPros.com, YoungAsianTrannies.com, IslandDollars.com and Grooby.com. And I believe at least one hosting company took a direct VERY HARD hit.

They have been targeting Asian Shemale sites. From what I have recently heard, both the FBI (they now have a cyber unit for such things) and INTERPOL are getting involved.

What's going on is, someone with a ladyboy site or two is attacking all NEW sites that are coming online in attempt to hold onto their share of the market. They are pretty big hits and have caused some damage. There are a few news stories about it and many DNS experts are looking into it as well because the strength of the attacks and the ease in which they are attacking.

It's all fun and games until INTERPOL is tracking you.

DWB 02-18-2009 09:03 PM

Quote:

Originally Posted by Fletch XXX (Post 15517963)
guys come on, its the same as the cyber security companies.

this is just put out there by the same people they quote in the article.... i doubt the attack occured. Really.

Fletch, I already listed the sites. Two of them are mine. The attacks are real.

Here is another story with LadyboyDolls.com listed in it: http://www.theregister.co.uk/2009/02...ation_attacks/

Please remove your head out of your ass please. :2 cents:

DWB 02-18-2009 09:04 PM

Quote:

Originally Posted by PR_Tom (Post 15517949)
Yeah, and which one was the attacker?

hahahahahahahahahahahaha.com

Iron Fist 02-18-2009 10:52 PM

Quote:

Originally Posted by DirtyWhiteBoy (Post 15520395)
hahahahahahahahahahahaha.com

Very funny.

AnniKN 02-18-2009 11:23 PM

Is the domain banned here already? :helpme

doridori 02-18-2009 11:41 PM

seems like a great way to go after competitors.

pornask 02-18-2009 11:57 PM

I host some of my sites with ISPrime. Damn. Did you guys find some form of solution so the sites don't go down for three days should such attack reoccur?

DWB 02-19-2009 03:55 AM

Quote:

Originally Posted by pornask (Post 15520850)
I host some of my sites with ISPrime. Damn. Did you guys find some form of solution so the sites don't go down for three days should such attack reoccur?

ISPrime seems to be able to hold their own against it now I think. They have some slick techs over there it seems. :thumbsup

bobby666 02-19-2009 06:29 AM

a thrilling story

geedub 02-19-2009 06:41 AM

lady boy mafia

fris 02-19-2009 07:05 AM

if hosts would fix their dns servers

marketsmart 02-19-2009 07:08 AM

"Attack of the Ladyboy's".... i wonder who will direct it...

Dirty D 02-19-2009 07:11 AM

Don't piss off the lady boys!


All times are GMT -7. The time now is 07:20 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123