<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>attack Archives - Tarheel Media Digital Marketing</title>
	<atom:link href="https://tarheel.media/tag/attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://tarheel.media/tag/attack/</link>
	<description>Digital Marketing The Right Way</description>
	<lastBuildDate>Wed, 29 Oct 2025 21:55:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://tarheel.media/wp-content/uploads/2022/12/cropped-tarheel-icon-1-32x32.png</url>
	<title>attack Archives - Tarheel Media Digital Marketing</title>
	<link>https://tarheel.media/tag/attack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DDOS Attack on Web Ports</title>
		<link>https://tarheel.media/service-updates/2024/03/29/ddos-attack-on-web-ports/</link>
		
		<dc:creator><![CDATA[Mike W.]]></dc:creator>
		<pubDate>Fri, 29 Mar 2024 09:18:38 +0000</pubDate>
				<category><![CDATA[Service Updates]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[status closed]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=5868</guid>

					<description><![CDATA[<p>We are currently seeing a large DDOS attack this morning affecting multiple customer websites. DDOS stands for Distributed Denial of Service. Unlike a single-source DoS, a DDOS uses many source IPs at once, so blocking one address does not stop the attack. How this attack works These attacks do not require a server or network  [...]</p>
<p>The post <a href="https://tarheel.media/service-updates/2024/03/29/ddos-attack-on-web-ports/">DDOS Attack on Web Ports</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We are currently seeing a large DDOS attack this morning affecting multiple customer websites. DDOS stands for Distributed Denial of Service. Unlike a single-source DoS, a DDOS uses many source IPs at once, so blocking one address does not stop the attack.</p>
<h2>How this attack works</h2>
<p>These attacks do not require a server or network vulnerability. Attackers overwhelm resources with legitimate-looking requests to exhaust CPU, memory, connection slots, or packet-handling capacity. Imagine a PO box that receives so much bulk mail in one day the post office must start returning mail because there’s no room — that’s what a DDOS does to a server.</p>
<p>This is what tipped us off:</p>
<p><img data-dominant-color="fbfaf3" data-has-transparency="true" style="--dominant-color: #fbfaf3;" fetchpriority="high" decoding="async" class="alignnone size-full wp-image-5876 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1.png" alt="" width="580" height="646" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-200x223.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-269x300.png 269w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-400x446.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-500x557.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1.png 580w" sizes="(max-width: 580px) 100vw, 580px" /></p>
<h2>What we observed</h2>
<p>Typical VLAN traffic averages about 35 kbps. During the attack we saw interfaces stuck at 4+ Mbps, which is alarming even though the network can carry more than 10 Gbps. The problem here is packets-per-second that strain routers, not raw bandwidth. If we weren’t using octa-core routers and modern edge filters, some services would have dropped.</p>
<p><img data-dominant-color="f8f9f9" data-has-transparency="true" style="--dominant-color: #f8f9f9;" decoding="async" class="alignnone size-full wp-image-5870 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel.png" alt="" width="1708" height="993" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-200x116.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-300x174.png 300w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-400x233.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-500x291.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-600x349.png 600w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-700x407.png 700w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-768x447.png 768w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-800x465.png 800w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1024x595.png 1024w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1200x698.png 1200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1320x767.png 1320w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1536x893.png 1536w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel.png 1708w" sizes="(max-width: 1708px) 100vw, 1708px" /></p>
<p>All traffic used user-agents reporting Mac 11 and Chrome 87, which we believe are forged. The bulk of requests originated from IP ranges in China, with occasional sources in the U.S., EU, and Russia. Right now they appear to be targeting an American Christian church site for bandwidth exhaustion.</p>
<p>On other sites, such as an office furniture site, attackers retried repeatedly over several hours to force downtime:</p>
<p><img data-dominant-color="f1f1f1" data-has-transparency="true" style="--dominant-color: #f1f1f1;" decoding="async" class="alignnone size-full wp-image-5871 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview.png" alt="" width="790" height="829" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-200x210.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-286x300.png 286w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-400x420.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-500x525.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-600x630.png 600w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-700x735.png 700w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-768x806.png 768w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview.png 790w" sizes="(max-width: 790px) 100vw, 790px" /></p>
<h2>Mitigation status</h2>
<p>So far we have mitigated the attack and it has not grown in strength. We have seen short bursts since it began, but upstream filters and our edge rules have been effective.</p>
<p><img data-dominant-color="e6e9e7" data-has-transparency="true" style="--dominant-color: #e6e9e7;" decoding="async" class="alignnone size-full wp-image-5875 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2.png" alt="" width="1498" height="1176" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-200x157.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-300x236.png 300w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-400x314.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-500x393.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-600x471.png 600w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-700x550.png 700w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-768x603.png 768w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-800x628.png 800w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-1024x804.png 1024w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-1200x942.png 1200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-1320x1036.png 1320w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2.png 1498w" sizes="(max-width: 1498px) 100vw, 1498px" /></p>
<p>We have collected more than 11,000 IPs making blanket requests. As upstream providers apply filters, the attackers’ effectiveness drops and the attack eases.</p>
<p><img data-dominant-color="d8dadb" data-has-transparency="false" style="--dominant-color: #d8dadb;" decoding="async" class="alignnone size-full wp-image-5877 not-transparent" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3.png" alt="" width="336" height="1366" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3-74x300.png 74w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3-200x813.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3-252x1024.png 252w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3.png 336w" sizes="(max-width: 336px) 100vw, 336px" /></p>
<p>The attack pattern looks random across subnets and networks. It does not appear to target a specific site type beyond being U.S.-focused.</p>
<h3>UPDATES</h3>
<p><strong>5:46 am:</strong> Our upstream providers report this may form part of a larger campaign meant to strain United States internet infrastructure. They see similar attacks across many customers.</p>
<p><strong>5:52 am:</strong> We have almost entirely neutralized the initial DDOS surge.</p>
<p><img data-dominant-color="d8d9da" data-has-transparency="false" style="--dominant-color: #d8d9da;" decoding="async" class="alignnone size-full wp-image-5882 not-transparent" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1.png" alt="" width="369" height="1002" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1-110x300.png 110w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1-200x543.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1.png 369w" sizes="(max-width: 369px) 100vw, 369px" /></p>
<p><strong>11:00 am:</strong> Attackers shifted to Slowloris-style tactics, attempting to hold many slow connections and strain servers at the application layer. We adjusted timeouts and connection handling and again mitigated these attempts. The transition is visible below:</p>
<p><img data-dominant-color="ebe8df" data-has-transparency="true" style="--dominant-color: #ebe8df;" decoding="async" class="alignnone size-full wp-image-5902 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis.png" alt="" width="482" height="852" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis-170x300.png 170w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis-200x354.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis-400x707.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis.png 482w" sizes="(max-width: 482px) 100vw, 482px" /></p>
<p><strong>3:35 pm:</strong> Issue closed. Attacks have ceased and we do not expect further impact to our services at this time.</p>
<p>We will continue to monitor traffic and remain in constant contact with upstream providers. If anything changes, we will post updates here.</p>
<p>The post <a href="https://tarheel.media/service-updates/2024/03/29/ddos-attack-on-web-ports/">DDOS Attack on Web Ports</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
