Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

8/13/2013
05:43 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prolexic DDoS Protection Service Stops Attackers From Bringing Down 1ink.com e-Commerce Sites

1ink.com is an online retailer of replacement inkjet and laser toner cartridges

HOLLYWOOD, FL – (August 13, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that 1ink.com has selected Prolexic's DDoS mitigation service to protect its network of e-Commerce sites. 1ink.com is a leading online retailer of high-quality replacement inkjet and laser toner cartridges.

The 1ink.com network was hit with the first of three DDoS distributed denial of service attacks that grew in size and complexity. The first DDoS attack brought down www.101inks.com, one of the smaller 1ink.com e-Commerce sites, for more than a day. During that time, they routed traffic from 101inks.com to their other domains in an attempt to mitigate the attack.

To stop the DDoS attack, Roland Davoudikia, chief executive officer of 1ink.com, selected Prolexic from among several DDoS mitigation services he had researched. Prolexic mitigated the attack within 5 minutes, as outlined in Prolexic's industry-leading service level agreement (SLA).

"We concluded from our post-attack forensic analysis that it is likely the 1ink.com websites were mistakenly targeted," said Stuart Scholly, president of Prolexic. "This illustrates that even random events can have significant financial impact on a business if some level of DDoS mitigation is not in place."

Later in the year, the company's main e-Commerce site at www.1ink.com was hit with another attack – a combination SYN and DNS flood that peaked at 70 Gbps. As expected, this denial of service attack did not bring down the site, because Prolexic's PLXproxy DDoS protection service was already in place. Five days later, the DDoS attackers struck again, and once again Prolexic was able to quickly detect and mitigate the attack without any action from 1ink.com.

"Having Prolexic's DDoS mitigation service is like having insurance against DDoS attacks, and as a result, these last two attacks did not have any effect on our business," said Davoudikia. "There was the potential to lose hundreds of thousands of dollars in online sales each day, along with collateral damage to our partner relationships. Fortunately, none of that happened. I can't imagine running my business without DDoS attack protection from Prolexic."

To learn more, download the 1ink.com DDoS case study at www.prolexic.com/1ink.

About Prolexic

Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, energy, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit www.prolexic.com and follow us on LinkedIn, Facebook, Google+, YouTube, and @Prolexic on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.