Flooded Servers
Andrew Hay is Lares Consulting‘s COO. He says there was no vulnerability exploited in the attacks.
“The attackers simply overwhelmed the servers by flooding the sites with garbage requests — exhausting the server’s resources,” he said. “Many of the targeted organizations are already utilizing anti-DDoS content delivery networks (CDNs) to mitigate attacks of this nature. Unfortunately, the content delivery network (CDN) infrastructure couldn’t prevent the flood of requests.”
Tags: