Font size:
Page background:
Letter spacing:
Images:
Disable visually impaired version close
Version for visually impaired people
News

DDoS attack on Dyn provider affected more than 50 gTLDs

More than 50 generic top-level domains ended up being affected by DDoS attack on a large DNS provider Dyn last week. Domain Incite, citing IANA’s information, reported this. The attack was organized using Mirai botnet that unites devices of the Internet of Things (CCTV cameras, home routers, etc.) that were successfully cracked by criminals. As a result of the incident, users from the US and several European countries were for some time denied access to a variety of large Internet resources including Netflix, Twitter, Spotify, PayPal and Reddit.

Half of the new domain zones that were affected by the consequences of DDoS attack, according to Domain Incite, were very small and not very popular. The other half was domains administered by Uniregistry, one of the largest players on the market of new domains. In particular, domains .LINK, .CAR and .PHOTO were affected by the attack. However, the CEO of Uniregistry Frank Schilling assured that all webpages administered by the registry stayed online. He highlighted that even though his company did use Dyn's services, it didn't rely only on third-party DNS provider but also on it's own DNS infrastructure, which allowed to overcome DDoS attack without any serious problems.

Previous News Next news