Analytics
8/13/2013
05:43 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Prolexic DDoS Protection Service Stops Attackers From Bringing Down 1ink.com e-Commerce Sites

1ink.com is an online retailer of replacement inkjet and laser toner cartridges

HOLLYWOOD, FL – (August 13, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that 1ink.com has selected Prolexic's DDoS mitigation service to protect its network of e-Commerce sites. 1ink.com is a leading online retailer of high-quality replacement inkjet and laser toner cartridges.

The 1ink.com network was hit with the first of three DDoS distributed denial of service attacks that grew in size and complexity. The first DDoS attack brought down www.101inks.com, one of the smaller 1ink.com e-Commerce sites, for more than a day. During that time, they routed traffic from 101inks.com to their other domains in an attempt to mitigate the attack.

To stop the DDoS attack, Roland Davoudikia, chief executive officer of 1ink.com, selected Prolexic from among several DDoS mitigation services he had researched. Prolexic mitigated the attack within 5 minutes, as outlined in Prolexic's industry-leading service level agreement (SLA).

"We concluded from our post-attack forensic analysis that it is likely the 1ink.com websites were mistakenly targeted," said Stuart Scholly, president of Prolexic. "This illustrates that even random events can have significant financial impact on a business if some level of DDoS mitigation is not in place."

Later in the year, the company's main e-Commerce site at www.1ink.com was hit with another attack – a combination SYN and DNS flood that peaked at 70 Gbps. As expected, this denial of service attack did not bring down the site, because Prolexic's PLXproxy DDoS protection service was already in place. Five days later, the DDoS attackers struck again, and once again Prolexic was able to quickly detect and mitigate the attack without any action from 1ink.com.

"Having Prolexic's DDoS mitigation service is like having insurance against DDoS attacks, and as a result, these last two attacks did not have any effect on our business," said Davoudikia. "There was the potential to lose hundreds of thousands of dollars in online sales each day, along with collateral damage to our partner relationships. Fortunately, none of that happened. I can't imagine running my business without DDoS attack protection from Prolexic."

To learn more, download the 1ink.com DDoS case study at www.prolexic.com/1ink.

About Prolexic

Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, energy, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit www.prolexic.com and follow us on LinkedIn, Facebook, Google+, YouTube, and @Prolexic on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web