On Friday, October 21st, 2016 millions of users in North America and across the world experienced connectivity issues with many prominent sites, like Twitter, PayPal, Spotify, AWS and more. This was due to a very large attack that common DNS provider Dyn was experiencing. According to Dyn, the attack started 11:00 and 17.
Dyn, also known as DynDNS, is a very large DNS provider that caters to multiple prominent customers (PayPal, Netflix, SalesForce, Deutsche Telekom, TripAdvisor, LinkedIn and more). The first alert that Dyn provided on its status page was at 11:10 UTC. The Dyn DDoS attack impacted both its DNS service and its advanced service monitoring. The attack continued until at least 19:00 UTC, spanning a total of eight hours and comprising three major strikes.
Many websites that rely on Dyn, including Amazon, PayPal, Twitter and GitHub, were reported as being affected. See the table below for more details. An organization affected by this can see short- and long-term recommendations specified below.
According to some websites [1], it has been confirmed that the botnet behind the attack is the Mirai botnet, which became famous recently as it was also used to attack the KerbsonSecurity blog. The Mirai botnet is known for its usage of IoT devices (at least partially), which are the reason for its enormous power.
The main source of information about the Dyn DDoS attack is Flashpoint, which has investigated the attack for Dyn [1]. Here are the highlights.
This data should be considered with some caution since published information must protect a site’s customer reputation.
Red Button’s recommendation is to not rely on a single DNS provider. De Facto, our customers that used a second provider in addition to Dyn have weathered the attack without impact.
Following is the recommended setup, provided by the order of DDoS resiliency. We understand that for some organizations these recommendations are easier said than done, so we have also included possible caveats and workarounds under the ‘Considerations‘ section below.
Considerations (of using two DNS servers)
Two Active DNS Servers
Active-Passive DNS servers
Recommended reading:
Internet Sociaty: How To Survive A DNS DDoS Attack – Consider using multiple DNS providers.
DNS DDoS attacks are extremely common and have become the “weapon of choice” of hackers for several reasons:
In the past, organizations have maintained their own authoritative DNS servers, but over the years many have chosen to migrate to external DNS service providers like Dyn. DDoS was one of the reasons for this migration – they were simply unable to mitigate these attacks and “outsourced” this problem to someone else.
As a result of this transition in the last few years, DNS providers are handling extremely large and complicated attacks. In some cases, they accept a new customer that is under an ongoing attack, although some providers have also rejected such customers.
There is no question that DNS providers are handling attacks much better than the end customer is. However, this also comes with a risk – if they are unable to do so, their entire customer base goes down.
[1] Flashpoint – An After-Action Analysis of the Mirai Botnet Attacks on Dyn
[2] KerbsonSecurity: DDoS on Dyn Impacts Twitter, Spotify, Reddit