• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 5th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News
News

Leading DNS Provider NS1 Targeted with DDoS Attacks

May 26th, 2016 Waqas Cyber Attacks, Cyber Crime, News 0 comments
Leading DNS Provider NS1 Targeted with DDoS Attacks
Share on FacebookShare on Twitter
NS1 has been providing DNS services to Imgur, Yelp, Max CDN, OpenX, Collective and imgIX!

NS1, one of the leading DNS providers in the world have revealed that their servers have been facing massive distributed denial of service (DDoS) attacks for last two weeks. That’s not all, the attackers also targeted NS1’s partners by shutting down their websites. Though the customers were partially affected by these attacks it is still unclear who the attackers were or what were their motives.

[q]No ransom demands were made[/q]

According to a blog post by NS1’s CEO Kris Deevers on May 16th, company’s Managed DNS network came under a series of DDoS attacks above 20-30 Gbps, with most above 10-20M packets/sec (pps). Mr. Deevers is positive that the attack was not on the customers but on NS1 infrastructure as attackers also DDoSed the hosting provider of ns1.com website.

“Unless a group ultimately steps forward and claims responsibility for a DDoS attack, it can be difficult or impossible to ever ascertain the underlying motivation or the responsible party. Attacks can be motivated by any number of things, ranging from political intentions to business motivations to outright malice. We will not speculate further. However, we have contacted the appropriate law enforcement authorities and are working with them to investigate,” said Beevers.

The targeted services also include NS1’s customer command-and-control systems, the official website (ns1.com) and system status report domain (StatusPage.io).

Since last two years, there has been an increase in DDoS attacks yet it’s hard to track the culprits, however, protection from such attacks is a necessity. In Feb 2016, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) signed a contract with Galois to protect its cyber infrastructure against both small and large scale cyber attacks.

[must url=”https://www.hackread.com/ddos-attackers-confronted-by-btcc-bitcoin-trader/”]BTCC Bitcoin Trader Confronts DDoS Attackers Like A Pro[/must]

[fullsquaread][/fullsquaread]

[must url=”https://www.hackread.com/internet-connected-car-hacked-and-ddosed-via-smartphone/”]Internet Connected Car Hacked and DDoSed via Smartphone[/must]

For now, NS1 has successfully pulled off the attack traffic. Beevers refrained from going into more details but the attack leaves several questions on the future of online business constantly under the threat of DDoS attacks.

Well, this has been an un-fun 24h. Proud of our team's creativity, scrappiness, endurance. We'll come out stronger than ever. <3 @nsoneinc

— Kris Beevers (@beevek) May 17, 2016

Usually, cyber criminals target businesses either for fun or to get some bucks. The recent attacks have shown an increase in DDoS attacks leading to ransom. The ProtonMail DDoS attack incident is a good example where attackers demanded the encrypted email service provider to pay $6000 as ransom but even after paying the criminals didn’t stop targeting the firm’s servers. However in the case of NS1, there’s been no demands for ransom at least not yet.

  • Tags
  • cyber attacks
  • Cyber Crime
  • cyber security
  • DDOS
  • internet
  • security
  • Technology
Facebook Twitter LinkedIn Pinterest
Previous article Twitter accounts are getting hacked and spreading adult content
Next article PayPal Users Hit with ''Account Limitation'' Phishing Scam
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
IT Security firm Qualys extorted by Clop gang after data breach

IT Security firm Qualys extorted by Clop gang after data breach

Hackers hit Microsoft Exchange Server to steal email data

Hackers hit Microsoft Exchange Server to steal email data

Crypto firm Tether claims hackers have demanded $24m in ransom

Crypto firm Tether claims hackers have demanded $24m in ransom

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Top Russian hacker forums Maza, Verified hacked; data leaked online
Hacking News

Top Russian hacker forums Maza, Verified hacked; data leaked online

IT Security firm Qualys extorted by Clop gang after data breach
Cyber Crime

IT Security firm Qualys extorted by Clop gang after data breach

Marketing firm CallX exposed customers data including call recordings
Leaks

Marketing firm CallX exposed customers data including call recordings

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us