Skip to main content

Attackers Target Internet Root Servers

Although the motivation for the attack remains unknown, early Tuesday attackers launched a distributed denial-of-service attack against the Internet’s core DNS servers, which are ultimately responsible for converting human-friendly site names (like www.digitaltrends.com) to IP numbers (like 209.85.60.103) which computers, routers, and software uses behind the scenes. Think of DNS as the ever-updating address book for the millions of machines on the Internet.

Three of the thirteen top-level root servers—one operated by ICANN, one by the U.S. Department of Defense, and one by UltraDNS—were briefly overwhelmed with the flood of bogus traffic pointed at them from hordes of so-called “zombie” computers around the world, although none of the three ever stopped working entirely. The remaining root servers were unaffected, and, for the most part, Internet users never noticed a major attack was underway. The incident serves as an illustration of the age-old tenet of the Internet’s design to route around damage: the DNS system is decentralized, such that if one host goes offline or becomes unavailable, remaining hosts take over the load.

“These zombie computers could have brought the web to its knees, and while the resilience of the root servers should be commended, more needs to be done to tackle the root of the problem—the lax attitude of some users towards IT security,” said Graham Cluley, senior technology consultant at Sophos, in a statement. “Society is almost totally reliant on the Internet for day-to-day communication—it’s ironic that the people who depend on the web may have been the ones whose computers were secretly trying to bring it down.”

Reports indicate that the attack’s origin and coordination of zombie computers may have taken place in South Korea; however, the nature and motivation of the attackers remains unclear. Denial-of-service attacks are typically used by cyber-criminals as an extortion mechanism: they take control of a zombie network and use it to flood a key router, server, or single point of failure for a network provider or business such that the organization’s Internet connectivity grinds to a halt or the server’s crash under the load. Once the attack is underway and proven effective, they blackmail the organization, offering to call off the attack in exchange for cash or other demands. Many organizations targeted by such attacks never go public for fear of damaging their reputation.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
The Meta Quest 3 will get an exciting new type of app
A Windows app extends into 3D space via a Meta Quest 3 VR headset.

A Windows app extends into 3D space via a Meta Quest 3 VR headset. Microsoft

At Build 2024, Microsoft announced it partnered with Meta to extend Windows apps into 3D space with the help of a Quest VR headset. When working on physical objects, it’s important to have spatial awareness of components.

Read more
How to build a PC from scratch: A beginner’s guide
Installing RAM in a desktop PC.

Building a PC for the first time, or even the second or third time, can feel a little intimidating. But one of the best parts about building a computer is that, for the most part, the parts fit where they should, and don't fit where they shouldn't. A graphics card will fit in the graphics card slot, and good luck putting the CPU in the wrong socket.

With a little care, time, and this handy guide, you can build a PC without hassle. We're here to walk you through it.

Read more
Microsoft just made Paint relevant again
Person using Windows 11 laptop on their lap by the window.

The controversial Recall feature has grabbed all the headlines from Microsoft’s Copilot+ announcements yesterday, but this new AI feature is also making Paint relevant again.

It’s called Cocreator, and it’s a new AI feature that can turn your quick sketch, augmented by text, into a much more realistic and impressive image. The exciting thing is that it does all this in real time. It might not get it right the first time, so you'll need patience, and the more details you give about what you want in the image, the better.

Read more