Microsoft revealed the 'system crash' incident in early June was caused by a DDoS attack
During the first week of June, Microsoft unexpectedly experienced a severe outage affecting most of its services including Azure, Outlook, and Teams.
Your browser doesn’t support HTML5 audio
During the first week of June, Microsoft unexpectedly experienced a severe outage affecting most of its services including Azure, Outlook, and Teams. Everything has been quickly fixed by Microsoft and has not recorded any serious damage from customers. However, it is not until now, that the Redmond company has begun to disclose the cause of the problem. And as expected of many experts, the problem stemmed from a large-scale cyber attack.
In a recent blog post, Microsoft revealed details of an attack that took place in early June against network infrastructure, causing disruptions to a variety of services and taking nearly 15 hours for the company's engineers to fix. According to the Redmond giant, the company has identified a sudden increase in traffic to some of its services, and has immediately launched an investigation into the DDoS (Distributed Denial of Service) attack.
Microsoft further noted that the threat actors used multiple Virtual Private Servers (VPS), proxies, rented cloud infrastructure as well as various DDoS tools to carry out the attack. Although the case was relatively complicated, Microsoft confirmed that customer data was not accessed or compromised at all.
This recent DDoS activity targets Layer 7 and not Layer 3 or 4. Microsoft has enhanced its Layer 7 protections including tweaking the Azure Web Application Firewall (WAF) to better protect customers from the effects of similar DDoS attacks.
Microsoft also shared some technical details surrounding the attack. According to the company, a threat actor with the identifier Storm-1359 used a set of botnets and tools to launch an attack on the company's servers. These attacks include HTTP(S) overloading the system and exhausting resources through a large number of SSL/TLS requests and HTTP(S) handshakes. In Microsoft's case, the attacker sent millions of HTTP(S) requests from countless IP addresses around the globe to overload the system.
Not only that, the attacker also uses Cache bypass to bypass the CDN layer and overload the initial system with a series of queries. Finally, they continue to use Slowloris where the client requests a resource from the server but does not acknowledge receipt of the resource, forcing the server to keep the connection open and the resource in its memory.
Microsoft ends the post with a series of tips and recommendations for Azure customers to protect themselves against future Layer 7 (Layer 7) DDoS attacks. However, the company did not disclose details regarding the damage or any financial impact it suffered as a result of the attack.
Although it is not a new form of attack, DDoS is always considered the top threat to global organizations and businesses. More dangerously, both the complexity and scale of DDoS attacks are forecast to increase sharply recently, with new records continuously being set.
You should read it
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- What is Volumetric DDoS Attack?
- How many DDoS cases are reported in 2019?
- Warning: DDoS attacks are becoming more dangerous both in scale and complexity
- What is DDoS Extortion attack?
- Yandex suffered the largest DDoS attack in history
- Prepare the total force to respond to DDoS attacks in 2014
- 5 Things You Didn't Know About DDoS attacks
- Do you know what is the preferred 'prey' of DDoS attack?
- How to prevent DDoS attack with Nginx
- What is botnet DDoS?
- DDoS Attack Group Extortion sent requests to extort money to thousands of companies
Maybe you are interested
How to fix STOP error 0x0000008E Samsung's unnamed director stated the company's biggest goal is to defeat Apple How to use LastPass to manage passwords professionally How to change the color and size of the mouse pointer on Windows 10 Super lovely wallpaper about the bow: Scorpion, Than Nong, Thien Yet and Thien Hat Use extended mouse buttons to increase efficiency