[box type = " note "] Mitigating a large attack hitting much of the EU
— CloudFlareStatus(@ CloudFlareSys)February 10,2014[/ box]
[box type = " note "] Continuing to work through attack, also affecting some of the US
— CloudFlareStatus(@ CloudFlareSys)February 10,2014[/ box]The company spent several hours mitigating the attack, but said that the European network was largely unaffected. When helping to deal with the massive cyberwar on Spamhaus last year, CloudFlare claimed it slowed down the entire World Wide Web, which prompted critics todubthe company’s part a“PR stunt effort. ”CloudFlare had some spooky statement to offer its customers this time as well. According to Prince, the latest attack has shown someone has got“a big, new cannon, ”and it could be a“start of ugly things to come. ”French hosting firm OVH also reported being hit by an attack of more than 350Gbps in strength, but it was not clear whether it was the same attack CloudFlare experienced.
— Matthew Prince(@ eastdakota)February 11,2014[/ box]The technique used by Monday’s attackers was not exactly new, as they exploited the Network Time Protocol(NTP) used to synchronize clocks on computer systems. A weakness in the protocol allows querying an NTP server about connected clients and their traffic counts. If made en masse, such requests can generate an overwhelmingly large traffic, bringing down the target just like a typical DDoS attack would do. What makes the recent attacks worse is the so - called“spoofing”of IP addresses of attackers, making it look as if the victim is actually generating those spam requests. The number of trash requests also skyrockets by“large”replies thrown back at the target from a number of servers“compromised”in the attack. For this reason, such tactics are often referred to as an“reflection and amplification”attack.