Cyber attacks disrupt PayPal, Twitter,
other sites
Send a link to a friend
[October 22, 2016]
By Joseph Menn, Jim Finkle and Dustin Volz
(Reuters) - Hackers unleashed a complex
attack on the internet through common devices like webcams and digital
recorders and cut access to some of the world's best known websites on
Friday, a stunning breach of global internet stability.
The attacks struck Twitter, Paypal, Spotify and other customers of an
infrastructure company in New Hampshire called Dyn, which acts as a
switchboard for internet traffic.
The attackers used hundreds of thousands of internet-connected devices
that had previously been infected with a malicious code that allowed
them to cause outages that began in the Eastern United States and then
spread to other parts of the country and Europe.
"The complexity of the attacks is what’s making it very challenging for
us," said Dyn’s chief strategy officer, Kyle York. The U.S. Department
of Homeland Security and the Federal Bureau of Investigation said they
were investigating.
The disruptions come at a time of unprecedented fears about the cyber
threat in the United States, where hackers have breached political
organizations and election agencies.
Friday's outages were intermittent and varied by geography. Users
complained they could not reach dozens of internet destinations
including Mashable, CNN, the New York Times, the Wall Street Journal,
Yelp and some businesses hosted by Amazon.com Inc.

Dyn said attacks were coming from millions of internet addresses, making
it one of the largest attacks ever seen. Security experts said it was an
especially potent type of distributed denial-of-service attack, or DDoS,
in which attackers flood the targets with so much junk traffic that they
freeze up.
VULNERABILITIES EXPLOITED
Dyn said that at least some of the malicious traffic was coming from
connected devices, including webcams and digital video recorders, that
had been infected with control software named Mirai. Security
researchers have previously raised concerns that such connected devices,
sometimes referred to as the Internet of Things, lack proper security.
The Mirai code was dumped on the internet about a month ago, and
criminal groups are now charging to employ it in cyber attacks, said
Allison Nixon, director of security research at Flashpoint, which was
helping Dyn analyze the attack.
Dale Drew, chief security officer at communications provider Level 3,
said that other networks of compromised machines were also used in
Friday's attack, suggesting that the perpetrator had rented access to
several so-called botnets.
The attackers took advantage of traffic-routing services such as those
offered by Alphabet Inc's Google and Cisco Systems Inc's OpenDNS to make
it difficult for Dyn to root out bad traffic without also interfering
with legitimate inquiries, Drew said.
"Dyn can't simply block the (Internet Protocol) addresses they are
seeing, because that would be blocking Google or OpenDNS," said Matthew
Prince, CEO of security and content delivery firm CloudFlare. "These are
nasty attacks, some of the hardest to protect against."
[to top of second column] |

An attendee looks at a monitor at the Parsons booth during the 2016
Black Hat cyber-security conference in Las Vegas, Nevada, U.S.
August 3, 2016. REUTERS/David Becker

GOVERNMENT WARNED OF ATTACKS
Drew and Nixon both said that the makers of connected devices needed
to do far more to make sure that the gadgets can be updated after
security flaws are discovered.
Big businesses should also have multiple vendors for core services
like routing internet traffic, and security experts said those Dyn
customers with backup domain name service providers would have
stayed reachable.
The Department of Homeland Security last week issued a warning about
attacks from the Internet of Things, following the release of the
code for Mirai.
Attacking a large domain name service provider like Dyn can create
massive disruptions because such firms are responsible for
forwarding large volumes of internet traffic.
Dyn said it had resolved one morning attack, which disrupted
operations for about two hours, but disclosed a second a few hours
later that was causing further disruptions. By Friday evening it was
fighting a third.
Amazon's web services division, one of the world's biggest cloud
computing companies, reported that the issue temporarily affected
users in Western Europe. Twitter and some news sites could not be
accessed by some users in London late on Friday evening.
PayPal Holdings Inc said that the outage prevented some customers in
"certain regions" from making payments. It apologized for the
inconvenience and said that its networks had not been hacked.
A month ago, security guru Bruce Schneier wrote that someone,
probably a country, had been testing increasing levels of
denial-of-service attacks against unnamed core internet
infrastructure providers in what seemed like a test of capability.
Nixon said there was no reason to think a national government was
behind Friday's assaults, but attacks carried out on a for-hire
basis are famously difficult to attribute.
(Reporting by Joseph Menn in San Francisco, Jim Finkle in Boston and
Dustin Volz in Washington. Additional reporting by Eric Auchard in
Frankurt, Malathi Nayak in New York, Jeff Mason and Mark Hosenball
in Washington, Adrian Croft and Frances Kerry in London; Editing by
Bill Trott, Lisa Shumaker and Jonathan Weber)
[© 2016 Thomson Reuters. All rights
reserved.]
Copyright 2016 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.

 |