WordPress Mobile Website Google Search results & AMP
October 7, 2016Why use WordPress for my website?
December 10, 2016DDoS attack affects Major websites
DNS provider DynDNS, (Dyn.com) is currently under attack using very aggressive DDoS attacks. You may have experienced outages today if you use them for your website DNS.
DynDNS updates can be found here and on Twitter.
Any website or online service that uses Dyn.com for DNS resolution will be affected by this attack. The following is a list of sites/services affected by these attacks:
- Amazon
- Paypal
- Spotify
- Netflix
- Shopify
- Wordcamp
- Github
- Esty
- Soundcloud
- Heroku
And that is not even all that this attack has affected.
The attacks can have an affect your website’s shopping cart checkout if you use a service provider who has been affected by these attacks as well as other service you provide to your customers. These may include the following:
External fonts, external style-sheets, external javascript, external jQuery, external images and any external page components from an outside server. These can cause loading errors and page pages inaccessible. A solution to this is that you may have to temporarily move these to your own server.
Twitter Social media integration. Because Twitter was not available earlier today it’s API becomes unavailable, affecting certain pages loading and user’s ability to share posts.
External/Off-server Backups. Backups may not be copied over if the domain does not stay accessible.
Are you affected by this attack? If so you consider setting up another DNS provider as a backup DNS or temporarily moving all DNS to secondary provider. Amazon has done this to alleviate the attack. You need to exactly duplicate your DNS configuration on your secondary provider before making this the authoritative DNS for your domain. The transfer may take anywhere from 24 to 48 hours to complete. But of this this may all be over by that time.
This attack appears to be on Dyn’s infrastructure. Dyn are working continuously to alleviate this attack. If you would like to keep up to date with this you can check BGP routes as Dyn tries to alleviate this attack.
The Mirai malware source code that infects a very large Internet of Things botnet was released to the general public on Friday October 14th, 2016. It is being said by Brian Krebs this “virtually guarantees that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices”. The Mirai source code release may be in direct relation to the large scale attack today.
also showing major brands having issues today isDownDetector.