Logo

DOSarrest Vulnerability Testing and Optimization
Navigation
  • Home

LinkedIn DDoS response botched

on June 21, 2013 |
DDoS Attack Specialist Defend Against DDoS Denial of Service Attack DoS Attacks

More than half of Linkedin’s members were knocked off the service for an extended period yesterday following a botched response to a DDOS by service provider Network Solutions.

Users were redirected in error to India-based website confluence-networks.com which did not require Secure Sockets Layer connections meaning users’ cookies were sent in clear text.

Initial media reports suggested the company’s DNS had been hijacked and user security potentially compromised as user’s cookies may have been visible as plain text during the outage.

Linkedin subsequently confirmed on Twitter that the outage was due to human error not malice.

“Yesterday’s issue was not malicious in any way It was an error by the company that manages our domain,” the statement said.

In a post on its site the company claimed LinkedIn member data was not compromised.

For protection against your eCommerce site click here.

Source: http://www.scmagazine.com.au/News/347578,linkedin-ddos-response-botched.aspx

Share this story:
  • tweet

Recent Posts

  • Link11 Discovers Record Number of DDoS Attacks in First Half of 2021

    July 15, 2021 - 0 Comment
  • A New Wave of DDoS Extortion Campaigns by Fancy Lazarus

    June 16, 2021 - 0 Comment
  • ‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

    June 12, 2021 - 0 Comment
Comments are closed.
DOSarrest ad

Keep updated with the latest DDoS Attacks

RSSSubscribe
  • Home
  • Latest News
  • Contact
  • Sitemap
© Copyright 2013. All Rights Reserved. Web Development by: 6folds Marketing