
Servers from different countries (mostly Unites States, Germany, Russia, France) were sending more than 16 millions of GET / and /s=87675957 requests (with random numbers to bypass caching) during the first round of attacks. It seems that when the attackers came back a second time round, they hadn’t learned their lessons and tried a similar technique and an almost identical botnet. After manually enabling Deflect’s advanced protection mechanisms and adjusting the origin’s configuration, the website became stable again.Ī Zambian democratic watchdog organization was attacked twice between August 08-09 and 11-12. Unfortunately, this attack was not fully mitigated in a quick way and caused several hours of downtime for real users. Many of the participating IPa were proxies possible revealing the original sender with X-Forwarded-For header. Obviously this attack was adapted against Deflect caching defenses. Attackers also reverted to using forged User-Agents in request strings. Large portions of attack traffic were not accessible to Deflect, targeting the hosting data center with 元/L4 floods.Īlmost 4,000 unique IP addresses issued more than 70 millions “GET /” and “GET /?&148294400498e131004165713TT117859756720Q106417752262N” requests against the website, using `cache busting` techniques with random query_string parameters. The attack began on November 15th and continued throughout the next two weeks. This attack targeted an independent investigative journalism website from the Philippines. Otherwise it could be your system attacking Ukrainian websites too! Top banned unique IPs by vendorģ7312 /ru/ukraino-rossiyskie-peregovory-v-stambule-itogi This is another important reminder for patching your computer systems and other Internet connected devices. As you can see – a significant amount of bots originated from the United States. Over 300,000 requests per minute were generated by the attackers. Our log aggregation and analysis system was affected by the overall amount of requests and was out of sync for a short period of time. We enabled Challenger for this domain to be sure we can mitigate future attack without any issues for the origin. The Baskerville system did not react as expected (this has been fixed). There was a partial downtime for this website for about an hour as Deflect was not able to mitigate this attack fast enough to be sure no malicious requests are hitting the origin.

Several hundred were compromised webservers and SOCKS proxies. These bots were from Brazil, USA, Indonesia, India, Bangladesh and many other countries, almost 1,000 of them seems to be infected MikroTik routers.

On the 31st of March, between 07:45-8:50 GMT+0 about 1,300 unique IPs were blocked by Deflect as they attacked informator.ua with GET /ru?8943563843054274 and POST /ru?829986440416200 requests, utilizing cache-busting techniques.
