Skip to Content
Uncategorized

Web Attacks Highlight a Bigger Problem

DDoS attacks are a symptom of a common illness, albeit with an elusive cure.

Mystery still surrounds this week’s distributed denial of service (DDoS) attacks on U.S. and South Korean websites, and while speculation points to North Korea as the source, it’s likely that we’ll never know for certain. The use of a botnet–thousands of infected computers–by definition obscures the identity of the attacker, and with thousands of IP addresses involved, they’re hard to trace back to the source.

Network-based visualization of a DDoS.
Credit: Sandia National Laboratories

An article in the Wall Street Journal points out politically motivating factors that implicate North Korea: the timing can be linked to North Korea’s most recent missile launches, as well as new U.N. sanctions announced last week. Wednesday was also the fifteenth anniversary of the death of Kim Il-Sung, the former leader of the DPRK.

Even so, the attacks appear to be relatively unsophisticated. Jose Nazario of Arbor Networks, a company that monitors internet traffic and DDoS attacks calls them “amateurish” due to a mix of approaches cobbled together using a five- or six-year-old malcode that wasn’t particularly well hidden. It’s also only a moderately sized attack–at 25 megabits per second–though it involves just over 100,000 bots, concentrated heavily in South Korea. What’s most interesting, says Nazario, is the coordination of attacks on both U.S. and South Korean government and commercial sites.

While the attacks made headlines, DDoS is a common problem that happens to big companies every day, and far more aggressively than these hits to government and commercial sites. The White House, NSA, State Department and Department of Defense, after all, are not high traffic moguls like Google or Amazon, which get attacked daily and have built up their own in-house defenses, says Hal Roberts, of Harvard’s Berkman Center for Internet and Society. We just don’t hear about Amazonor Google getting attacked, Roberts says, because it happens so frequently and doesn’t bring down their sites. “There are literally hundreds, if not thousands [of attacks] going on in any given time,” says Roberts.

If two governments were to really go at it in cyberspace, Arbor Networks’ Nazario says they would more likely target key nodes like voice exchange points to inflict real pain or disrupt communications, or they could go after each other’s secrets, similar to the “Titan Rain” attacks that began in 2003, where government and academic research computers were mined for secret project information. Stealing or modifying data, says Nazario, would have a much bigger impact than overwhelming websites.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.