Go Daddy sites get hit with DoS attacks


Go Daddy Hacked

Web sites serviced by DNS and hosting provider Go Daddy were down today. A hacker using the "Anonymous Own3r" Twitter account claimed credit for the outage.
"Go Daddy is experiencing intermittent outages. This is impacting our site and some customer sites," company spokeswoman Elizabeth Driscoll told CNET in a phone interview. "We are working to restore all services and some are back online as we speak."
Driscoll said she could not say how many sites were affected, whether it was thousands or millions, or whether the outage had affected just sites hosted by Go Daddy or those who use its DNS services as well. She also said she could not say what caused the outage or comment on the hacker's claims, although she said the outage started just after 10 am PT today.
"The problem is I just don't have a lot of information for you right now," Driscoll said.
Meanwhile, the company's Twitter account posted this update: "Update: Still working on it, but we're making progress. Some service has already been restored. Stick with us."
The company had acknowledged the problem with a Twitter post earlier that said: "Status Alert: Hey, all. We're aware of the trouble people are having with our site. We're working on it."
And a message on the Go Daddy Support site read: "We are aware of an issue affecting several services, including email, our website and some customer websites. We understand your frustration. We want you to know that our team is investigating the source of the issue and is working to resolve it as quickly as possible."
In response to tweets from customers complaining about the outage and asking when it would be resolved, Go Daddy had tweeted: "Sorry to hear all your frustration. We're working feverishly to resolve as soon as possible."
The problem could be affecting thousands, if not millions, of sites, given that Scottsdale, Arizona-based Go Daddy is not only one of the biggest Web site hosters but also the largest domain registrar. The Go Daddy site itself was accessible earlier today for CNET but was down at last check. Twitter users were complaining that numerous sites hosted by the company were inaccessible.
A tweet from the @AnonOpsLegion account: "#TangoDown--http://www.godaddy.com/ | by@AnonymousOwn3r" was the initial public promotion of the outage, leading some to believe that the Anonymous online activist collective was behind the disruption.
However, the AnonymousOwn3r account clarified in various tweets that: "it's not Anonymous coletive [sic] the attack is coming just from me."
"Duuude? This attack affects not only corporations but also ppl who support your ideology. whats the rationale?" one supposed fan of Anonymous tweeted.
Later, the AnonymousOwn3r account said in response to a question of whether he took down the whole block of DNS (Domain Name System) servers: "yes! it's not so complex."
That was followed by: "when i do some DDOS (Distributed Denial of Service) attack i like to let it down by many days , the attack for unlimited time, it can last one hour or one month."
And the AnonymousOwn3r account explained his actions. "I'm taking godaddy down bacause (sic) well i'd like to test how the cyber security is safe and for more reasons that i can not talk now."
AnonymousOwn3r was responding to some questions in Portuguese and in one tweet claimed he was from Brazil.



A Hacker Brings Down GoDaddy


Go Daddy Hacked

A supporter of Anonymous, the loose confederation of rogue hackers, claimed responsibility on Monday for an attack that brought down GoDaddy, a Web hosting service, and its customers.
GoDaddy’s site was out for several hours Monday afternoon, as were many of the Web sites belonging to its 10.5 million customers, like the fantasy sports site Draftday and eBaum’s World, a humor site.
“We’re aware of the issues affecting our site,” Elizabeth Driscoll, a GoDaddy spokeswoman, said. “We’re still working to figure out what happened and determine the number of Web sites impacted.”
The person behind the Twitter account @AnonymousOwn3r took responsibility for the attack and said all of GoDaddy’s servers were knocked out with what is known as a distributed denial of service attack, or DDoS attack, in which a site is flooded with traffic until it collapses under the load.

“When I do some DDoS attack, I like to let it down by many days,” the person claiming responsibility said on Twitter. “It can last one hour or one month.”
This person said that he had conducted the attack alone and that it was not part of a broader Anonymous campaign. GoDaddy briefly became an target of Anonymous last December for its initial support of the Stop Online Piracy Act, or SOPA, a Congressional bill that would have made it possible for copyright owners to seek court orders to take sites offline for practicing or aiding piracy. GoDaddy withdrew its support of the bill after customers began transferring their Web sites to its competitors and hackers threatened to attack it.
But one of the Twitter accounts most frequently associated with Anonymous, @AnonyOps, distanced the group from Monday’s attack and said it was the work of one individual. “He’s either a newbie to activism and cutting his teeth by doing this, which is misguided, or he’s trying to give Anons a bad reputation,” the Twitter post said.


Rich Miller, the editor in chief of Data Center Knowledge, an online publication that tracks the data center industry, said a shutdown at GoDaddy had widespread repercussions for the Internet.
“This is potentially the largest kind of problem you could have on the Internet,” Mr. Miller said. “GoDaddy is the largest company in the domain industry thanks to its colorful Super Bowl commercials.”
Mr. Miller estimated that GoDaddy managed 52 million domain names and hosted about 5 million Web sites on its servers. Its sheer size has made the company a ripe target for hackers, he said.
GoDaddy was previously the target of two notable DDoS attacks, one in 2007 and another in 2009.
GoDaddy customers vented their frustration on Twitter and elsewhere. Bob de Luna, a director of public information at the United Hospital Fund, a nonprofit health organization, said four domain names it had registered with GoDaddy had been down for several hours. He said that when he contacted GoDaddy’s customer service line, a representative told him 750 people were waiting in line behind him. The representative told him that during service failures, a typical wait list was 20 people.
GoDaddy’s Web site was still down Monday evening, and the company said it would provide updates through its Twitter and Facebook accounts.

Go Daddy Hacked




Go Daddy Hacked


0 comments:

Posting Komentar