DDoS attacks on Dyn

Severity: CriticalCategory: SecurityService: Dyn
This summary is created by Generative AI and may differ from the actual content.
Overview
On October 21, 2016, three consecutive distributed denial-of-service attacks were launched against the Domain Name System (DNS) provider Dyn, causing major Internet platforms and services to be unavailable to large swathes of users in Europe and North America. The groups Anonymous and New World Hackers claimed responsibility for the attack. The activities are believed to have been executed through a botnet consisting of many Internet-connected devices that had been infected with the Mirai malware.
Impact
Major Internet platforms and services were unavailable to large swathes of users in Europe and North America.
Trigger
Numerous DNS lookup requests from tens of millions of IP addresses originating from a botnet consisting of many Internet-connected devices infected with the Mirai malware.
Detection
The US Department of Homeland Security started an investigation into the attacks.
Resolution
Mitigation was achieved through investigation by the US Department of Homeland Security and subsequent guilty pleas in cybercrime cases relating to the Mirai and clickfraud botnets.
Root Cause
The attack was a botnet coordinated through numerous Internet of Things-enabled (IoT) devices, including cameras, residential gateways, and baby monitors, that had been infected with Mirai malware.
;