Linode Hit by DDoS Attacks

JM Safe

Level 39
Thread author
Verified
Top Poster
Apr 12, 2015
2,882
Cloud hosting company Linode has suffered a series of service interruptions due to distributed denial-of-service (DDoS) attacks launched against its infrastructure over the past few days.

The campaign started on December 26 when the company reported that DDoS attacks had disrupted the Linode Manager and its website. On the same day, the attackers also targeted Linode’s DNS infrastructure, and the company’s data centers in Dallas, Atlanta, London and Newark.


It took roughly 2-3 hours for Linode’s systems and network engineering teams and the company’s upstream providers to mitigate the attacks.


On December 27, DDoS attacks were reported at the data centers in Atlanta, Newark, and London. Linode’s service status page shows that it took the company nearly four hours to mitigate the attack against the London datacenter, while network connectivity was restored in one hour, respectively two hours, in Atlanta and Newark.

The attacks against various components of Linode’s infrastructure continued on Monday and Tuesday.

In the early hours of Wednesday, shortly after announcing that a DDoS attack affecting Linode’s website had been mitigated, the company reported seeing continued attacks disrupting access to its web services.

The latest update indicates that the Dallas data center was again targeted recently, causing packet loss.

Kaspersky Lab reported in November that in the third quarter of 2015, Linux-based botnets accounted for nearly half of the total number of DDoS attacks. The most notable was the XOR botnet, which malicious actors leveraged to launch attacks that peaked at more than 150 Gbps.

A Kaspersky report released in December showed that almost half of the organizations hit by DDoS attacks actually claimed to know the identity of the attackers. The study is based on information from more than 5,500 companies across 26 countries.

linode-logo_standard_light_large.png

Thank you all for reading ;)

Source: Linode Hit by DDoS Attacks | SecurityWeek.Com
 

Rishi

Level 19
Verified
Honorary Member
Top Poster
Well-known
Dec 3, 2015
938
Encrypted backups in cloud( preferably with AES 256/384 bit) + local backups should be ample.Even if they hack the cloud storage who is going to make tedious effort to decrypt it unless you are someone really important,besides there will be enough unprotected data for them to forage from others. That's what I think.
 
Last edited:

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Well sometimes overall security structure on online sites may not determine the effectiveness unless a true attack encounter. That incident shows of possible mishap on configuration setup as usually they focus more on being mainstream.
 

frogboy

In memoriam 1961-2018
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
To clarify i did mean to backup my data i much prefer to backup to two separate portable HDD,s at the for each backup i make on a regular interval. ;)
 

Jack

Administrator
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Things are getting even worse for Linode, as now they've discovered a breach in their security, prompting all there users to reset the passwords.
Read more: Linode Status - Security Notification and Linode Manager Password Reset

In progress

Security Notification and Linode Manager Password Reset
Posted about 19 hours ago. Jan 05, 2016 - 19:44 UTC

Scheduled
Effective immediately, Linode Manager passwords have been expired. You will be prompted to set a new password on your next login. We regret this inconvenience, however this is a necessary precaution.

A security investigation into the unauthorized login of three accounts has led us to the discovery of two Linode.com user credentials on an external machine. This implies user credentials could have been read from our database, either offline or on, at some point. The user table contains usernames, email addresses, securely hashed passwords and encrypted two-factor seeds. The resetting of your password will invalidate the old credentials.

This may have contributed to the unauthorized access of the three Linode customer accounts mentioned above, which were logged into via manager.linode.com. The affected customers were notified immediately. We have found no other evidence of access to Linode infrastructure, including host machines and virtual machine data.

The entire Linode team has been working around the clock to address both this issue and the ongoing DDoS attacks. We've retained a well-known third-party security firm to aid in our investigation. Multiple Federal law enforcement authorities are also investigating and have cases open for both issues. When the thorough investigation is complete, we will share an update on the findings.

You may be wondering if the same person or group is behind these malicious acts. We are wondering the same thing. At this point we have no information about who is behind either issue. We have not been contacted by anyone taking accountability or making demands. The acts may be related and they may not be.

The security of your data, the functionality of your servers, and your confidence in Linode are extremely important to all of us. While we feel victimized ourselves, we understand it is our responsibility, and our privilege as your host, to provide the best possible security and service. You can help further enhance the security of your account by always using strong passwords, enabling two-factor authentication, and never using the same password at multiple services.

We sincerely apologize for the recent disruptions in your Linode service. Thank you for your patience, understanding and ongoing trust in Linode.
 
Last edited:
  • Like
Reactions: scot and frogboy

Tony Cole

Level 27
Verified
May 11, 2014
1,639
I also use two external HDD's never have, nor use a cloud backup system/software. Why are DDoS attacks so expensive to conduct?
 
  • Like
Reactions: JM Safe and scot

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
@Tony Cole : A brief research will lead you to know the numerous technical factors. link

In order to understand, those developers are namely design to provide sophisticated tools for expensive prices cause a guaranteed result will be taken and all you need is knowledge to conduct an attack.

Because if you will be the one develop your own techniques of course you will push on high price cause if not then which means the effectiveness isn't applicable and can easily resolve not just for days for fixing the DDOS damages.
 
  • Like
Reactions: JM Safe

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top