Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:17 PM
Dark Reading
Dark Reading
Products and Releases

Prolexic Mitigates DDoS Attack Against U.S. Utility Company

Attackers now targeting network infrastructures that cause collateral damage

HOLLYWOOD, FL – (March 7, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it mitigated an attack against a U.S. metropolitan utility company earlier this month. The utility, which provides services to an estimated 420,000 electric, 305,000 water, and 230,000 sewer customers, has engaged Prolexic to provide DDoS protection services.

On February 17, 2013, the utility company's website, online payment system and automated pay-by-phone billing system were brought down for 48 hours by a combination Layer 4 DDoS attack. During that time, more than 155,000 customers could not pay bills online or by phone. In addition, employees could not receive external e-mails.

"Utilities is another vertical market that is likely to be victimized in the coming months as attackers look beyond daily targets like e-Commerce and financial services," says Stuart Scholly, president at Prolexic. "Attackers are targeting network infrastructures to cause collateral damage to other shared resources, so organizations must think about their different areas of vulnerability beyond website URLs."

The DDoS attack, which Prolexic identified as originating in the U.S., was highly sophisticated and particularly difficult for the utility company's IT department to detect and mitigate because the attack directly targeted the back-end IP addresses of the utility's Internet-facing network. On the second day of the attack, Prolexic was engaged by the utility to take emergency action to mitigate the distributed denial of service attack.

Prolexic's DDoS mitigation engineers quickly determined that the attackers were targeting backend IPs directly. They developed and launched a specially crafted routed DDoS defense that immediately began to reduce the strength of the hackers' sophisticated attack on the back-end IPs. Prolexic mitigation engineers continued to fight the distributed denial of service attack and quickly adjusted defense strategies as the attackers changed their attack signatures. The Layer 4 attack peaked at 3.3 Gbps and 5.7Mpps (packets-per-second).

"Once traffic was on-ramped to Prolexic, the DDoS attack was mitigated in a matter of minutes and all services were restored to our website and automated pay-by-phone system," said a representative of the utility company. "Prolexic quickly ended what could have been a devastating blow to our customer service and our reputation for reliable service."

"Prolexic considers every DDoS attack to be zero-day and we have designed our mitigation infrastructure so we can respond accordingly," said Scholly. "As a result, clients can be confident that Prolexic's proxy or routed solutions can provide 100% protection against all distributed denial of service attacks."

The case study about this utility is available to the public, free of charge, at www.prolexic.com/utility-case-study.

About Prolexic

Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit www.prolexic.com, follow us on LinkedIn, Facebook, Google+ , YouTube , and @Prolexic on Twitter.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...