Feeds

DDoSers attack DoubleClick

And now for an ad break

  • alert
  • submit to reddit

The essential guide to IT transformation

Internet ads firm DoubleClick was the victim of a distributed denial of service attack yesterday.

A flood of malicious traffic from a network of zombie machines reduced DoubleClick's ability to serve ads over the Web, affecting many of its high-profile customers. Services have now been restored to normal. But at the height of the assault yesterday afternoon (UK time) the availability of Web pages featuring ads served by DoubleClick was severely reduced.

Website hit particularly hard included Nortel Networks, Gateway, CNN.com and Schwab.com and The Washington Post. Admins had to stop DoubleClick's ads from running on their sites in order to make the rest of their content accessible. DoubleClick's own website was also hit by the assault.

DoubleClick spokeswoman Jennifer Blum said the attack targeted the firm's domain name servers (DNS) causing "severe service disruptions" for all 900 customers, the The Washington Post reports. The attack ran from approximately 10:30 EDT to 14:00 EDT.

The Washington Post compares the assault on DoubleClick to a recent brownout of sites served by content distribution firm Akamai. Akamai blamed a software glitch for problems that rendered a variety of high-profile websites and services temporarily unavailable for approximately 90 minutes on 24 May. A better comparison for the attack against DoubleClick might be a DDoS assault against Internet payments firm WorldPay last November.

Many such attacks originate from a network of hosts compromised by viruses such as MyDoom and Phatbot. These turn infected machines into zombie drones under the control of virus writers or their accomplices. Owners of these zombie PCs are often ignorant of the involvement of their computers in attacks, which are growing more sophisticated.

A simple DDoS attack is relatively straightforward to block, but some tools allow hackers to launch 'mutating attacks' against targeted systems. By running through a spectrum of attacks it's possible to keep a site locked down for hours, or even days. ®

Related stories

Search drives US online ad sales
WorldPay fights 'massive, orchestrated' attack
WorldPay recovers from massive attack
Akamai software glitch provokes Web brownouts
Cybercops seize Russian extortion masterminds (suspects in DDoS attacks against online bookies)
Bagle copycat builds Zombie attack network
Phatbot arrest throws open trade in zombie PCs
Microsoft attack worm rides on the back of MyDoom

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.