DynDNS, immediately after the massive hacker attack suffered last October 21, has lost about 8% of the internet domains it managed
The estimates come from an analysis conducted by Dan Dahlberg, a researcher at BitSight Technologies in Cambridge, which speaks of a more than 14 thousand who have abandoned DNS (Domain Name System) services offered by the New Hampshire-based company.
All because of a DDoS (distributed denial of service) attack aimed at the global population of Internet of Things devices, such as security cameras and video recorders (DVRs) connected to the web and infected by the Mirai malware. And at the expense is anyone who relied on DNS services provided by DynDNS to resolve domain names into IP addresses and vice versa. A DNS service, in practice, is a technology at the base of the web functioning that translates human-understandable domains (such as “libero.it “) into numeric IP addresses for the use of computers, and various devices, that make Internet communication possible. If one of these DNS services is down, it wreaks havoc on the web.
Internet in chaos
And the havoc was wreaked first when, this powerful Mirai malware infected a huge number of devices, which in turn messed up Dyn’s DNS services they were connected to which, subsequently made it impossible for a large number of domains, and therefore people, to access the Internet and connect to widely used sites such as PayPal, Twitter, Reddit, Amazon, Netflix and Spotify. “The data shows that Dyn lost a large number of customers because they were affected by Mirai,” explains Dan Dahlberg. How did this play out? DynDNS was recently acquired by Oracle Corporation.