4.9 • 696 Ratings
🗓️ 23 October 2016
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, October 24th, 2016 edition of the Sands and Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.3 | And of course, we have to start today with the denial of service attack against Dine from Friday. Last Friday, Dine was under a massive |
0:24.1 | denial of service attack that had some widespread repercussions. In particular, customers |
0:30.3 | of Dine that were not reachable because Dine wasn't able to resolve their host names. |
0:38.2 | Some of the names were Twitter, Netflix, Spotify, |
0:42.5 | but the list goes on. |
0:44.7 | There are thousands of sites, thousands of companies |
0:47.5 | that were affected by this outage. |
0:51.0 | It has been widely acknowledged that this attack was yet another event that was |
0:57.2 | precipitated by the Mirai Botnet. We talked about this before and Dyn is talking about |
1:05.1 | tens of millions of IP addresses that participated in the attack. That sounds a little bit large. My current guess is that |
1:13.6 | the Mirai botnet is more around a million hosts. Now typically attacks that come from Mira are |
1:20.6 | not spoofed. It's possible that there were other botnets that contributed to the attack as well so it wasn't just myri but then again |
1:31.2 | if you experience a very large attack like this sometimes monitors and such don't work correctly |
1:38.4 | so it could just be an artifact in how the data is collected that they came up with that big number. |
1:45.2 | Regardless, it was a very big attack. |
1:48.1 | We have seen, for example, with the Brian Krebs attack, what this botnet is capable of. |
1:55.4 | Eventually, Dyn was able to limit the impact of the attack, and it sounds like at this point that the attack has |
2:04.8 | stopped. But what this really means for the future is the Mirai botnet is still out there. |
2:10.2 | ISPs are working on sort of disrupting the command control channel, but it's just a matter of time |
2:15.5 | at this point that whoever is control of that |
2:18.3 | botnet is redirecting it to a different target and while there are plenty of |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.