• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Everything You Need to Know About the Dyn DDoS Cyberattack

The cyberattack on DNS provider Dyn created outages on sites as massive as Twitter and Amazon. What happened?

November 8, 2016 Jonathan Blackwood Leave a Comment

If you’ve been on the internet in the past few weeks you’ve heard about the large scale cyberattack on DNS provider Dyn.

On October 21, major websites including Twitter, Amazon, Spotify, Reddit, PayPal, Airbnb, Wired, Pinterest, and more experienced outages. The common thread? Each of these sites used Dyn as their upstream DNS provider. A DNS provider is a company that allows you to go to a website. You type in the URL, and the DNS provider associated with that domain name translates it for your computer into the IP address that actually lets you travel to that site.

No DNS provider, no travel to the site the DNS provider serves.

That’s what happened to the sites you weren’t able to reach. A Distributed denial-of-services (DDoS) attack was carried out on Dyn, and because of that the DNS provider wasn’t able to handle the requests made by real users that wished to get to sites. A DDoS attack can occur in a few different ways – TechDecisions spoke with John Shier, Senior Security Expert at Sophos, for clarification.

“There are actually a few different types of DDoS attacks,” says Shier. “Volumetric, protocol based, and application based. There are some nuances between each one of them.”

  • Volumetric – Sheer volume. Launch as much information, requests, etc. at a site as possible so that it is unable to process any other request.
  • Protocol Based – Exploit a specific protocol. Figure out the specific way that a site is processing traffic and exploit it to disallow the site from processing that traffic.
  • Application Based – An application level attack. You do something to the application level that it can’t handle in order to get the web server attack.

The DDoS attack on Dyn began at 11:10 UTC on October 21. At this point a volumetric DDoS attack was carried out on the DNS provider that sent an unreasonable amount of traffic toward the target, causing it to effectively run out of network resources.

What was unique about the DDoS attack on Dyn was that it was carried out using Internet of Things devices. A relatively new form of attack, Internet of Things presents is a particularly juicy opportunity for hackers. Any device connected to the web can potentially be utilized to carry out attacks.

This form of DDoS attack was thrust into the spotlight not long before the Dyn attack. Popular cyber security site, Krebs on Security, was hit with a record cyberattack flooding Krebs’ site with more than 620 gigabits of traffic per second. The attack was so strong that it caused cloud-hosting giant Akamai Technologies to dump the site from its network.

So how does a DDoS attack using Internet of Things work? In much the same way that a regular DDoS attack works, with a bit more creativity on the front end.

“The first step is reconnaissance work that needs to be done by the criminals behind this,” says Shier. “There’s ways of scanning the internet for anything that’s connected, such as the site Shodan. That’s where you find a lot of these IoT devices. Using one of these scanners, you can discover open network devices. You would then log onto those devices using common default passwords. Some of these devices have hardcoded passwords, and some have well known default passwords that people don’t bother changing. Not through negligence, just people don’t know they should do that.”

Related: How to Handle Internet of Things Security 

Finding the devices, accessing the devices, getting control of the devices, and using the devices to launch an attack – this all happens programmatically. The hacker will load code into the device that essentially turns it into a bot, creating what’s called a botnet, which then reports back to the hacker’s command and control center. Once that happens, the hacker can begin launching attacks using the different devices. Requests come from everywhere at once, from all of these different devices that the hacker is controlling through code.

For the Dyn attack, specifically, a Marai malware botnet was used to carry out the attack. The same botnet that was used on Krebs on Security. Hackers used devices like routers, webcams, security cameras, and DVRs in order to create the botnet and launch the DDoS attack. Over 100,000 devices were used in the Dyn attack, rendering the provider unable to process requests, and effectively locking down the sites that use Dyn services. The attacks came in traffic bursts 40 to 50 times normal flows, and lasted over 9 hours.

What’s so scary about Marai is that the code is available to the general public. The owner of the botnet published the source code online and now any hacker or group of hackers can utilize it to their advantage.

As of now it’s not known who carried out the attack, or for what purpose. According to CSO Online, cybersecurity legend John McAfee suspects that it is Bureau 121, a North Korean cyberwarfare agency. The Department of Homeland Security is currently investigating the attack to find the culprits.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Antivirus, Corporate, Cyber Attacks, Data Security, Malware Protection

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.