Staminus Blog

Articles, Thoughts, and Speculations from the Staff
firewall2-01 (1)

The Great Firewall of China: Fears Realized

By | Blog, Tech News | No Comments

A couple of months ago, I wrote an article about how the Great Firewall of China, due to a code glitch, ended up sending out massive DDoS attacks. This obviously spells danger if it falls into the wrong hands and is misused. Last week, GitHub fell prey to a large DDoS attack that caused intermittent issues with their service for over four days. What was this DDoS attack all about? Why did it happen?

Read More

SNMP Attacks: The Big Thing of Today

By | Blog | No Comments

servers-01 (1)

First, there was DNS. Open DNS resolvers were exploited to generate massive DDoS attacks. Over time, most of these open DNS resolvers were patched so that they would not reply to unknown DNS requests. Then, there was NTP. Just like DNS, but at a much larger amplification factor, DDoS attackers were able to generate very large attacks. And just like DNS, over time exploitable NTP servers were mostly patched, making it significantly harder to generate the huge attacks that were wreaking havoc on the Internet. Although DNS and NTP amplification attacks still exist, they are much harder to execute and are nowhere near as large as they used to be. But now, SNMP amplification attacks are on the rise.

Read More

transit blog-01 (1)

Service Providers and DDoS

By | Blog, Tech News | No Comments

Most often when we hear about DDoS, we focus on the target of the attack. The target is generally going to be someone providing an application service to the world – such as a video game, a website, a VoIP server, or other publicly desired service. This could be on one server for a small player in the space or it could be spread across thousands of servers for someone like Sony. In both cases, the service can be dramatically affected with the right kind of DDoS attack. The service providers that carry the traffic very seldom are concerned about the DDoS as they’re simply conduits on the Internet connecting one network to another. They carry traffic and deliver it to its destination on demand. They have sufficient capacity to do this.

But what happens when they don’t? What happens when the carrier is crushed by the sheer power of the attack? If an attack is sufficiently large, can it actually impact a service provider or carrier? More importantly, what happens when the carriers are the culprits of the DDoS attack, being used against their will to engage in widespread nefarious activities?

Read More

ipv4 blog

IPv4, IPv6 and DDoS, Part 1: How IPv4 Works

By | Blog, Tech News | No Comments

Just about everyone has heard of an IP address, and most people have some basic knowledge of what an IP address is. is the standard gateyway that home routers use, for example. The first time you go to configure a home router, you put that IP address into your web browser. The format WWW.XXX.YYY.ZZZ is known as IPv4 format. The total number of IPs in the IPv4 IP space is 2^32 power. That sounds like a lot, but it’s really not. IPv4 depletion, as it’s known, refers to the fact that the world is running out of IPv4 IPs to give out to people. Currently, there’s less than 1% of the total IPv4 IP space left. Read More

smarthome blog (1)

DDoS from the Most Unlikely of Places

By | Blog | No Comments

“Smart” technology is all the rage these days. Everyone I know has a smart phone. They do their work from it remotely, they video chat with their family in other countries; it has basically become one of those can’t-leave-home-without-it type of  devices. “Smart” simply signifies that the device is internet ready. You can connect out from it, or into it. What does this mean for the future? How will DDoS play a role in the upcoming years as a result of smart devices?

Read More

cables blog (1)

DDoS Stress Testers – Part 2

By | Blog | No Comments

In part 1 of this series, we’ve explained what stressers are, how they work, and where they got their start. What can be said for the early years is that the level of work required to hire someone to use a DDoS attack made it a lot more prohibitive. Bandwidth was expensive, the resources hard to find, and the overall affect was lackluster in comparison to the effort required. If you weren’t capable of using a DDoS attack yourself, chances are you weren’t going to hire one either.

Today, anyone can use Google to find a stress tester and be offered a large number of options, for incredibly cheap prices. It’s gaining ground in business, gaming, finances, and sometimes just for fun, which is having a truly damaging impact on companies and customers. What a difference a decade can make! What changed? In today’s article, I will discuss in a bit more detail why there are so many stress testers around now.

Read More


Your Phone is Your Computer: Protect it Like One

By | Uncategorized | No Comments

According to Cisco, global mobile data traffic grew 69 percent in 2014, reaching 2.5 exabytes per month. Facebook recently revealed that 78 percent of its US users are mobile. Apple is now the most valuable company in the history of the world. The mobile platform is quickly becoming the platform of choice for Internet users. Mobile phones have long performed far more tasks than just the phone application. Only recently, however, have they become a terrific platform to exploit and leverage to launch large-scale global DDoS attacks. Enter the age of LTE and high speed mobile DDoS botnets.

Read More


DDoS Stress Testers – Part 1

By | Blog | No Comments

By now, we have all heard of the DDoS tool that Lizard Squad put out just after Christmas. For those that don’t recall the situation, on Christmas day, Lizard Squad DDoSed Playstation Network, Sony’s online gaming service, and Xbox Live, Microsoft’s gaming network. Connectivity to the online services was not restored until the next day. This was a big deal and got a lot of media coverage due to the fact that it was done on Christmas day, a day where people are off work and school, so the services see a lot more usage. People received video games as gifts, and found them to be useless with no network to support them.

Lizard Squad, having been using DDoS attacks against several companies already, quickly came out to claim responsibility. Soon afterwards, they announced the release of their stresser, a tool that anyone could pay to use to DDoS whoever they want. Having just sent two major companies offline and several others in the months before, they had proven the strength of their attacks in what would turn out to be an intelligent (although dubious) marketing strategy.

So what’s up with these stressers? How do they work? Why are there so many of them nowadays? Where were they all before?

Read More

Related Posts

mitigate ddos attacks

Staminus is known for being one of the world’s most reliable DDoS mitigation companies today, thanks to its revolutionary global automated system recovery and replacement software. We mitigate DDoS attacks for a wide range of industries, from healthcare to government to retail. For mission-critical demands, trust only Staminus.

mitigate ddos

Businesses that depend on websites in some form or another—to process and collect information, payments, or transactions—are vulnerable to distributed denial of service attacks, which can cause catastrophic losses. To mitigate DDoS attacks, partner up with Staminus. Have a look at our website to see what we can do for you.

ddos services

Even the most robust web infrastructures are not immune to DDoS services attacks. If your business uses a website to process critical information such as financial information, transactions, and important data, then you need Staminus. We can protect you from distributed denial of service attacks no matter what your industry. Contact our experts to learn more.

ddos service

Hundreds of websites—from banking to retail and even charities—fall victims to DDoS service attacks on a regular basis. These attacks target sites and services hosted on high-profile servers, including banks, credit card gateways, and root nameservers. Make sure your business is protected from these attacks. Talk to us at Staminus to learn more.

DDoS Protection

Distributed denial of service attacks have crippled thousands of web-reliant businesses in all manner of industries, from government websites to educational institutions to travel and retail online stores. An attack can cause catastrophic financial losses. Prevent it with DDoS protection from Staminus.

DDoS Prevention

Don’t wait for a distributed denial of service attack to bring you down and cause huge financial losses. Sign up for DDoS prevention services now at Staminus. We serve almost all industries, including government, banking, travel and hospitality websites, and even charities. We have been in a leading DDoS mitigation company for over a decade.

DDoS Mitigation

If you’ve been hit by a DDoS attack, it’s time to call the experts of Staminus. Our DDoS mitigation and security company now has over 10,000 clients globally from more than 100 countries. Our technology is designed to protect all industries—from VoIP to retail websites—from distributed denial of service attacks.


DDoS are more rampant now more than ever, and they don’t discriminate. From small online retail shops to charities to full-scale data centers, these DDoS attacks have affected countless websites and have resulted in catastrophic financial losses. If you are a victim of a distributed denial of service attack, contact Staminus for immediate help.