Feeds

Microsoft crippled by S'Kiddies

Company's own techies didn't do enough damage

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

DoS'ing Script Kiddies easily disabled most of Microsoft's major Web sites Thursday, just as the company was recovering from the humiliation of being accidentally taken off line by its own (MCSE?) technicians Tuesday and Wednesday.

"During the morning of 25 January, Microsoft was the target of a denial-of-service attack against the routers that direct traffic to the company's Web sites," the company said in a statement late Thursday.

The little darlings attacked a router (or "routers" as the flacks insist) which MS had been using to manage DNS (domain name service) traffic, and in so doing rendered the company virtually invisible on the Web from early Thursday morning until the afternoon hours.

If the company had in fact been using "routers" (as opposed to "a router") as it claims, and ones properly distributed as is ought, it's unlikely that the attack could have been as effective as it was. According to the Associated Press, only two per cent of traffic was getting through during the attack.

The kiddies were no doubt inspired by the amusing DNS cock up earlier this week which also left the company's sites unavailable. In that case, MS had failed to distribute its DNS servers adequately, so that when its (MCSE?) retard(s) misconfigured the relevant "routers", it all flew to bits in a hurry, and stayed that way for quite a while.

The router(s) appear to be located on a single subnet, so even if there were more than one in use, the net effect would be to present a unified target to the world.

Idiotic behaviour which we might expect from some Mom and Pop on-line outfit, and regard with some sympathy in that case. But the company that would rule the Web needs a lesson in basic network architecture before transcending the low comedy in which it's just now cast itself. ®

Related Stories

MS blames lowly techie for Web blackout
Microsoft brings web sites back into play
Microsoft confirms Web site blackout
DNS trouble made Microsoft, Yahoo! unavailable
How you hack into Microsoft: a step by step guide

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.