Even the best cloud services provider too had faced the general DDoS attack recently. AWS has several plans for mitigating the DDoS risks, but once, it’s not able to secure against them.
On 23rd October, AWS was hit by a DDoS attack that lasted for eight long hours. It’s still unknown who has performed it.
Amazon’s support handle on Twitter has informed the issue on 23rd October at 1.36 AM. They said, “We’re investigating reports of intermittent DNS resolution errors with Route 53 & our external DNS providers.” Just after a few hours, they informed us, “The AWS DNS issues that may have affected your experience with Route 53 or our external DNS providers have been resolved”.
You can always check the status of Amazon’s web services in all the countries here: https://bit.ly/347hv6Z
The attacks are further confirmed by an AWS user on Reddit, who had received a response from the support team. In attack, the services relying on this Route 53 such as Amazon Relational Database Service (RDS), Simple Queue Service (SQS), CloudFront, Elastic Compute Cloud (EC2), and Elastic Load Balancing (ELB) are also suffered.
How and Why?
DDoS attacks are pretty technical. For them to occur, attackers use several computers with DDoS tools and send unwanted traffic to victim’s systems, letting them crash with Trojans infections and make them unavailable for those who wanted.
Most of these DDoS attacks are done for reducing competition by their competitors, or showing hactivism, or even for fun! And now, security researchers at Kaspersky has discovered that these attacks are now made asking for money.
Someone would be sending a message asking for Bitcoins at first and make a DDoS attack for a short while after the news, to make them know that he’s capable. And if ransom not received in time, a long session of attack is carried against that institution’s/individual’s resources to crash their services.