Even the best cloud services provider too had faced the general DDoS attack recently. AWS has several plans for mitigating the DDoS risks, but once, itโs not able to secure against them.
On 23rd October, AWS was hit by a DDoS attack that lasted for eight long hours. Itโs still unknown who has performed it.
Amazonโs support handle on Twitter has informed the issue on 23rd October at 1.36 AM. They said, โWeโre investigating reports of intermittent DNS resolution errors with Route 53 & our external DNS providers.โ Just after a few hours, they informed us, โThe AWS DNS issues that may have affected your experience with Route 53 or our external DNS providers have been resolvedโ.
You can always check the status of Amazonโs web services in all the countries here: https://bit.ly/347hv6Z
The attacks are further confirmed by an AWS user on Reddit, who had received a response from the support team. In attack, the services relying on this Route 53 such as Amazon Relational Database Service (RDS), Simple Queue Service (SQS), CloudFront, Elastic Compute Cloud (EC2), and Elastic Load Balancing (ELB) are also suffered.
How and Why?
DDoS attacks are pretty technical. For them to occur, attackers use several computers with DDoS tools and send unwanted traffic to victimโs systems, letting them crash with Trojans infections and make them unavailable for those who wanted.
Most of these DDoS attacks are done for reducing competition by their competitors, or showing hactivism, or even for fun! And now, security researchers at Kaspersky has discovered that these attacks are now made asking for money.
Someone would be sending a message asking for Bitcoins at first and make a DDoS attack for a short while after the news, to make them know that heโs capable. And if ransom not received in time, a long session of attack is carried against that institutionโs/individualโs resources to crash their services.