Feeds

GoDaddy stopped by massive DDoS attack

Millions of sites may be affected – not by Anonymous, it appears

The Power of One eBook: Top reasons to choose HP BladeSystem

A lone hacker has claimed responsibility for an ongoing denial-of-service attack that may have knocked out millions of websites hosted by world's largest domain registrar GoDaddy.

The attack began at around 10.00 Pacific time (17.00 GMT/18.00 BST) and appears to affect the registrar's DNS servers. Any site that is hosted with GoDaddy could be affected, although as of 13.00 Pacific (20.00GMT/21.00BST) the company reported that at least some service had been restored.

Claiming responsibility for the outage is a hacker who goes by the Twitter handle AnonymousOwn3r. Although that account's Twitter bio describes the hacker as "Security leader of #Anonymous" and "Anonymous Official member," a number of Twitter feeds affiliated with the hacker collective say that Anonymous was not involved, and AnonymousOwn3r himself has called for sole credit.

So far, no reason for the attack has been given, although speculation abounds. GoDaddy has earned its share of detractors for various reasons, ranging from its early support for the Stop Online Piracy Act (SOPA) in the US, to GoDaddy CEO Bob Parsons posting a video of himself shooting an elephant while on a Zimbabwe safari vacation.

According to AnonymousOwn3r, however, he "is not anti-GoDaddy" and the attack was not motivated by any of these reasons, but instead simply to point out flaws in the registrar's security:

GoDaddy customers were not generally impressed with this explanation, however, and many of them took to Twitter to voice their frustration that one individual was able to unilaterally take down their sites:

GoDaddy claims to have registered as many as 52 million websites, many of which are operated by small businesses. The company has not disclosed how many of the sites are included in the outage, though it is believed that the majority may be affected.

How long the outage will continue remains unknown. According to AnonymousOwn3r, when he launches a DDoS attack he might let it continue for "one hour or one month." As of this writing, GoDaddy says it is still working to address the problem and that restoring full services is its top priority. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.