1. 29

Akamai have apparently stopped protecting Brian Krebs site due to an enormous DDOS, information from the site in this article: http://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ can be found on Google Cache the attack was 620 Gbps in size, and using DNS amplification - and nearly double the size of the biggest previous DDOS attack against systems protected by Akamai.

  1.  

  2. 16

    One of those times when you’d really prefer getting what you paid for instead of a refund.

    1. 18

      For what it is worth, Krebs said that they had been providing their services for free. https://twitter.com/briankrebs/status/779111614226239488

      1. 24

        So I guess he gets both!

    2. 7

      It wasn’t just dns amplification, which makes it even more problematic. Much harder to filter what appears (to a filter) to be valid traffic. Someone apparently has a rather large botnet capacity (hypothesis I have read range from lots of IOT devices to hacked consumer firewalls).

      per the last tweet, they threw it all at my site; SYN Flood, GET Flood, ACK Flood, POST Flood, GRE Protocol Flood]; 665.00 Gbps;143.50 Mpps
      https://twitter.com/briankrebs/status/778402188267778048

      Also, apparently there are lots of other DDoS’s happening right now as well.

      1. 4

        Hopefully he’s able to secure a new hosting setup and get back online. He does a lot of valuable journalism, and I would be very sad to see him offline long-term.