Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/7/2013
01:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prolexic Mitigates DDoS Attack Against U.S. Utility Company

Attackers now targeting network infrastructures that cause collateral damage

HOLLYWOOD, FL – (March 7, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it mitigated an attack against a U.S. metropolitan utility company earlier this month. The utility, which provides services to an estimated 420,000 electric, 305,000 water, and 230,000 sewer customers, has engaged Prolexic to provide DDoS protection services.

On February 17, 2013, the utility company's website, online payment system and automated pay-by-phone billing system were brought down for 48 hours by a combination Layer 4 DDoS attack. During that time, more than 155,000 customers could not pay bills online or by phone. In addition, employees could not receive external e-mails.

"Utilities is another vertical market that is likely to be victimized in the coming months as attackers look beyond daily targets like e-Commerce and financial services," says Stuart Scholly, president at Prolexic. "Attackers are targeting network infrastructures to cause collateral damage to other shared resources, so organizations must think about their different areas of vulnerability beyond website URLs."

The DDoS attack, which Prolexic identified as originating in the U.S., was highly sophisticated and particularly difficult for the utility company's IT department to detect and mitigate because the attack directly targeted the back-end IP addresses of the utility's Internet-facing network. On the second day of the attack, Prolexic was engaged by the utility to take emergency action to mitigate the distributed denial of service attack.

Prolexic's DDoS mitigation engineers quickly determined that the attackers were targeting backend IPs directly. They developed and launched a specially crafted routed DDoS defense that immediately began to reduce the strength of the hackers' sophisticated attack on the back-end IPs. Prolexic mitigation engineers continued to fight the distributed denial of service attack and quickly adjusted defense strategies as the attackers changed their attack signatures. The Layer 4 attack peaked at 3.3 Gbps and 5.7Mpps (packets-per-second).

"Once traffic was on-ramped to Prolexic, the DDoS attack was mitigated in a matter of minutes and all services were restored to our website and automated pay-by-phone system," said a representative of the utility company. "Prolexic quickly ended what could have been a devastating blow to our customer service and our reputation for reliable service."

"Prolexic considers every DDoS attack to be zero-day and we have designed our mitigation infrastructure so we can respond accordingly," said Scholly. "As a result, clients can be confident that Prolexic's proxy or routed solutions can provide 100% protection against all distributed denial of service attacks."

The case study about this utility is available to the public, free of charge, at www.prolexic.com/utility-case-study.

About Prolexic

Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit www.prolexic.com, follow us on LinkedIn, Facebook, Google+ , YouTube , and @Prolexic on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.