Domain Name Service (DNS) provider Dyn provides new details about massive DDoS attack on Oct. 21. DDoS attacks came in traffic bursts that were 40- to 50 times normal flows, Dyn says. Most of the attack came from Mirai-based botnets, using an estimated 100,000 infected devices. Security experts say default credentials allowed the attackers to use an army of online cameras, DVRs, and other equipment in the attacks. But the big question of who was behind the attack remains under investigation.”]
Source: https://www.darkreading.com/attacks-breaches/ddos-on-dyn-used-malicious-tcp-udp-traffic

