Has your business been suffering from uncharacteristically very slow Internet connectivity lately?
Someone has “nuked” the Internet and hosting site Cyberbunker is believed to be behind the distributed denial of service (DDoS) blitz which began March 19 and has slowed down Internet speeds worldwide and has even prevented some organization from connecting to Web site, the paper said.
A common DDoS technique involves saturating a target network with external communications request of online traffic so that it is overwhelmed and could no longer respond to legitimate traffic. DDoS is often employed by attackers to render networks unavailable to their users. However, the DDoS attributed to Cyberbunker may be six time larger other previous attacks against major banks and is probably the largest announced DDoS to hit the Internet, according to Patrick Gilmore, chief architect at the Internet content provider Akamai Networks.
For example previous attacks on major banks were carried out with a magnitude of about 50 million bits per second. The current attack uses data streams of about 300 million bits per second.
Cyberbunker is a hosting site which takes its name from a 1996 decommissioned NATO bunker which it uses as its headquarters. The company’s Web site states that it hosts “services to any Web site except child porn and anything related to terrorism.”
A BBC New report said that Cyberbunker is thought to be working with Russian and Eastern European criminal organizations in the execution of the DDoS attack.
The attack is also believed to be in retaliation for Cyberbunker being blacklisted by non-profit anti-spam group Spamhaus. The group regularly lists databases of servers that are linked to spam and other criminal online activities.
Understanding how IBM Spectrum Protect enables hybrid data protection
Abdicating your company’s data protection responsibilities to the first cloud solution provider you encounter is just as unwise as doing nothing at all to leverage the cloud. On the other hand, it can be a wise decision to investigate what results you might achieve by choosing a backup technology that is capable of supporting a hybrid protection approach capable of covering both on-premises technology and offsite cloud capabilities.