(ANTIMEDIA) On Friday morning, a large-scale hack of an internet domain hosting provider took prominent websites including Netflix, Amazon, Reddit, Twitter, and Vox offline. Though many of the websites have since been restored, others remain compromised at the time of this article’s publication, the likely result of a second attack waged later in the morning.
As Mashable reported, Dyn, a New Hampshire-based company that hosts domain name systems, announced Friday morning it had been hacked. “Dyn said at 9:20 a.m. ET that it resolved an attack that began at 7 a.m. ET Friday. But at 11:52 a.m. ET, the company said an attack had resumed.”
The outlet explained just how central Domain Name Servers are to the basic functioning of the internet:
“Domain name systems (DNS) are essentially the GPS of the internet, taking the text URLs you type into a browser and figuring out where those websites’ data is located on the back end. So when you type mashable.com in a browser, it shows you both the real Mashable and can quickly and easily locate the nearest server that hosts the site’s data.”
In other words, as Gizmodo explained:
“Basically, they act as the Internet’s phone book and facilitate your request to go to a certain webpage and make sure you are taken to the right place.”
Wired noted that in both the 7 am and noon attacks, “traffic to Dyn’s Internet directory servers on the East Coast of the United States was stopped by a flood of malicious requests disrupting the system.”
Gizmodo reported emails from their readers seemed to suggest the second attack affected the West Coast and Europe.
Some outages occurred in Asia but the United States took the brunt of the attack, which has been identified as a DDoS attack — a “distributed denial of service.” As detailed by Wired:
“A DDoS attack overwhelms a DNS server with lookup requests, rendering it incapable of completing any. That’s what makes attacking DNS so effective; rather than targeting individual sites, an attacker can take out the entire Internet for any end user whose DNS requests route through a given server.”
When a server is overwhelmed with malicious requests, as well as by unsuspecting users repeatedly hitting “refresh” on their browser and automatic re-requests, the system becomes even further stressed.
During the first outage, Dyn’s executive vice president, Scott Hilton, attempted to relieve concerns about the takedown. “We have been aggressively mitigating the DDoS attack against our infrastructure,” he said.
For now, it remains unknown where the attack originated. Companies whose websites were hit by the initial attack included Business Insider, CNN, Etsy, the Guardian, I Heart Radio, GrubHub, HBO Now, People, PayPal, Fox News, Urban Dictionary, the Wall Street Journal, Kayak, People, Weather.com, the New York Times, and many others.
Many of these sites have been restored, but sites like the Guardian, Twitter, Soundcloud, and People, for example, remain down at the time of this article’s publication.
The implications of the attack are myriad. First, of course, is the issue of cyber security and the ability of hackers to break into Dyn’s DNS.
As Steven Morgan, founder of Cybersecurity Ventures, a research firm, explained to Mashable (which, along with Wired, was also taken offline in the attack early Friday morning):
“Hackers have no rules. One of the problems we have is that they move much faster than cyber-defenders. A DDoS attack can be launched in literally seconds, or under an hour if it’s coordinated by a larger group.”
The broader implication, however, may be the growing climate of fear-mongering surrounding hackers and cyber security. Hillary Clinton and the DNC have used Cold War rhetoric to imply Russian hackers are responsible for the ongoing, embarrassing leaks that have emerged this election cycle. These claims are arguably attempts to deflect focus from the actual misdeeds uncovered in the leak.
Further, this week vice president Joe Biden implied the U.S. government might soon wage a cyber attack against Russia, apparently aligning behind claims Russian hackers are attempting to influence the upcoming presidential election.
In truth, the political establishment has long been ramping up rhetoric against hackers, in general. Considering many hackers perform vital functions in the digital age — most notably, exposing government crimes — it is unsurprising the establishment is claiming more control is necessary to protect companies, government infrastructure, and the integrity of the American electoral process.
It’s likely this attack will be used as further evidence such an objective is valid, if not vital.
UPDATE 4:45 pm EST: CNBC reports Dyn says a third DDoS attack is currently underway
This article (Someone is Literally Trying to Take Down the Internet Right Now) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to Carey Wedler and theAntiMedia.org. Anti-Media Radio airs weeknights at 11 pm Eastern/8 pm Pacific. If you spot a typo, please email the error and name of the article to firstname.lastname@example.org.
Since you’re here…
…We have a small favor to ask. Fewer and fewer people are seeing Anti-Media articles as social media sites crack down on us, and advertising revenues across the board are quickly declining. However, unlike many news organizations, we haven’t put up a paywall because we value open and accessible journalism over profit — but at this point, we’re barely even breaking even. Hopefully, you can see why we need to ask for your help. Anti-Media’s independent journalism and analysis takes substantial time, resources, and effort to produce, but we do it because we believe in our message and hope you do, too.
If everyone who reads our reporting and finds value in it helps fund it, our future can be much more secure. For as little as $1 and a minute of your time, you can support Anti-Media. Thank you. Click here to support us