{"id":55,"date":"2007-03-02T10:21:54","date_gmt":"2007-03-02T17:21:54","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/?p=55"},"modified":"2017-04-25T04:52:45","modified_gmt":"2017-04-25T11:52:45","slug":"hackers-hit-key-internet-traffic-computers","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2007\/03\/hackers-hit-key-internet-traffic-computers","title":{"rendered":"Hackers hit key Internet traffic computers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"\" \/><\/p>\n<p>Here is a piece of news from early last month, via <a href=\"http:\/\/www.cnn.com\/2007\/TECH\/internet\/02\/06\/internet.attacks.ap\/index.html\">CNN<\/a>:<\/p>\n<blockquote><p><strong>WASHINGTON<\/strong> (AP) \u2014 Hackers briefly overwhelmed at least three of the 13 computers that help manage global computer traffic Tuesday in one of the most significant attacks against the Internet since 2002.<\/p>\n<p>Experts said the unusually powerful attacks lasted for hours but passed largely unnoticed by most computer users, a testament to the resiliency of the Internet.<\/p>\n<p>Behind the scenes, computer scientists worldwide raced to cope with enormous volumes of data that threatened to saturate some of the Internet\u2019s most vital pipelines.<\/p>\n<p>Experts said the hackers appeared to disguise their origin, but vast amounts of rogue data in the attacks were traced to South Korea.<\/p>\n<p>The attacks appeared to target UltraDNS, the company that operates servers managing traffic for Web sites ending in \u201corg\u201d and some other suffixes, experts said. Company officials did not immediately return telephone calls from The Associated Press.<\/p>\n<p>Among the targeted \u201croot\u201d servers that manage global Internet traffic were ones operated by the Defense Department and the Internet\u2019s primary oversight body.<\/p><\/blockquote>\n<p>It is not likely that the South Korean government or a large company had anything to do with the attack. The crime was probably perpetrated by a relatively small hacker group, which underscores the potential for asymmetric cyberwarfare. I\u2019m happy that the federal government has many people on the full-time job of defending cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is a piece of news from early last month, via CNN: WASHINGTON (AP) \u2014 Hackers briefly overwhelmed at least three of the 13 computers that help manage global computer traffic Tuesday in one of the most significant attacks against the Internet since 2002. Experts said the unusually powerful attacks lasted for hours but passed [\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-55","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":1,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"predecessor-version":[{"id":52310,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/55\/revisions\/52310"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}