News
31-01-2013
Between Sunday 27 January 2013, around midnight, and Tuesday 29 January 2013, around 5:00, our .be name servers received strikingly more queries than normal. In case this amount would become too high, this could possibly result in for instance a slower access to .be websites. But the stable DNS.be infrastructure makes sure the end user does not experience any noticeable delay.
A massive flow of queries isn’t just a heavy load on our infrastructure, the ultimate aim of this attack is to have DNS.be play an amplifying factor in reaching certain targets. This malicious technique is called an “amplification attack” or “DNS reflection attack”. The attacker uses this technique to launch a DDOS attack on the IP address of the victim via the DNS.be name servers.
Obviously, DNS.be doesn’t want to participate in DDOS attacks. We are doing all in our power to ensure the continuity of our service, while at the same time taking the necessary action to limit the damage of such an attack on the targeted third party. It might have been possible therefore that some of our name servers were responding a bit slower than usual. The query-answers are stabilized at the moment, and the attack has stopped.
go to original article