Domain Host Provider Under DDoS Attack

Wednesday, May 14, 2014 @ 10:05 AM gHale

Domain hosts Point DNS was under attack with a high intensity DDoS attack Friday, which knocked out servers for hours.

The size of the distributed denial of service (DDoS) attack and techniques used, along with who was behind the attack, remains a mystery.

Video Site Hole Linked to DDoS Hit
DDoS Attacks a Smokescreen for Data Theft
DDoS Techniques Changing
DDoS Attacks Break Records

“We’re experiencing a DDoS attack on all DNS servers we are working hard mitigate the attack,” Point DNS said in a update to its Twitter profile. “We’re still working through a massive DDoS. We’re adding more nameservers and working with our network providers,” it said.

The firm, who works with over 220,000 domains, ended up hit hard by the attack and, therefore, it affected the firms that used its services. Websites were up and running, but normal attempts to reach them by typing in a name to a browser would not resolve as normal.

The problem also means email will not deliver as normal to affected sites, with early indications suggesting clients clustered in Asia and Europe ended up affected the worst.

Security specialists at Incapsula spotted a similar attack, which peaked at 25 million packets per second. It reported seeing floods of non-spoofed IP data coming from two DDoS protection services as the cause of the outage.

“DNS flood have been around for a while but now the modern high-capacity servers take the attack to a new level,” said Incapsula product evangelist Igal Zeifman.

“Unlike amplification attacks, that could be easily spotted and filtered on-edge, DNS flood queries can’t be dismissed before they could be allowed to be processed by the server. With powerful botnet machines pumping millions of malicious request each second, and aiming them directly and the most vulnerable server resources (eg CPU), the old threat is now making a comeback in a very dangerous manner.” provides a suite of tools in the modern app stack to over 65,000 developers. PointDNS is one of its products.

Ed Byrne of explained that the attack began in the early hours of Friday morning (US west coast time) and had the knock-on effect of making customer queries unresponsive for around four hours, until it was able to get a secondary network up and running.

“It originated from China. The attack is still ongoing but subsiding and we’ve mitigated the impact to our customers,” Byrne said.

Leave a Reply

You must be logged in to post a comment.