Staminus Blog

Articles, Thoughts, and Speculations from the Staff
cables blog (1)

DDoS Stress Testers – Part 2

By | Blog | No Comments

In part 1 of this series, we’ve explained what stressers are, how they work, and where they got their start. What can be said for the early years is that the level of work required to hire someone to use a DDoS attack made it a lot more prohibitive. Bandwidth was expensive, the resources hard to find, and the overall affect was lackluster in comparison to the effort required. If you weren’t capable of using a DDoS attack yourself, chances are you weren’t going to hire one either.

Today, anyone can use Google to find a stress tester and be offered a large number of options, for incredibly cheap prices. It’s gaining ground in business, gaming, finances, and sometimes just for fun, which is having a truly damaging impact on companies and customers. What a difference a decade can make! What changed? In today’s article, I will discuss in a bit more detail why there are so many stress testers around now.

Read More


Your Phone is Your Computer: Protect it Like One

By | Uncategorized | No Comments

According to Cisco, global mobile data traffic grew 69 percent in 2014, reaching 2.5 exabytes per month. Facebook recently revealed that 78 percent of its US users are mobile. Apple is now the most valuable company in the history of the world. The mobile platform is quickly becoming the platform of choice for Internet users. Mobile phones have long performed far more tasks than just the phone application. Only recently, however, have they become a terrific platform to exploit and leverage to launch large-scale global DDoS attacks. Enter the age of LTE and high speed mobile DDoS botnets.

Read More


DDoS Stress Testers – Part 1

By | Blog | No Comments

By now, we have all heard of the DDoS tool that Lizard Squad put out just after Christmas. For those that don’t recall the situation, on Christmas day, Lizard Squad DDoSed Playstation Network, Sony’s online gaming service, and Xbox Live, Microsoft’s gaming network. Connectivity to the online services was not restored until the next day. This was a big deal and got a lot of media coverage due to the fact that it was done on Christmas day, a day where people are off work and school, so the services see a lot more usage. People received video games as gifts, and found them to be useless with no network to support them.

Lizard Squad, having been using DDoS attacks against several companies already, quickly came out to claim responsibility. Soon afterwards, they announced the release of their stresser, a tool that anyone could pay to use to DDoS whoever they want. Having just sent two major companies offline and several others in the months before, they had proven the strength of their attacks in what would turn out to be an intelligent (although dubious) marketing strategy.

So what’s up with these stressers? How do they work? Why are there so many of them nowadays? Where were they all before?

Read More


Educational Institutions and DDoS – Both Target and Origin

By | Blog | No Comments

Educational institutions have always played a pivotal role in breeding underground and counter-culture behavior. Many large DDoS attacks over the past 15 years have originated by students, often times no older than high school age. Historically, schools have had large connections with limited oversight and tracking, allowing their students to engage in nefarious behavior with little-to-no risk of getting caught. The tables have certainly turned in recent times. As corporate connections have become larger, schools are now finding themselves at odds with the underground culture they helped breed. Hacking groups are treating universities as both easy targets and easy sources of DDoS attacks.

Read More

greatwall (1)

Great Firewall of China – DDoS Machine?

By | Blog, Tech News | No Comments

China’s Golden Shield Project, also known as the Great Firewall of China (GFW), is a government controlled network firewall that monitors every bit of internet traffic generated inside of China. It is also used as a way to censor the internet in China through various methods, including: IP blocking, URL filtering, DNS filtering, and packet filtering. So what does any of this have to do with DDoS?

Read More

anonymous portrait (1)

A Brief History of DDoS – Part 2

By | Blog | No Comments

In part 1 of this series, a general history of the early rise of the Internet through IRC was discussed, as well as the beginnings of DDoS. What it was used for, and who was targeted. I covered the late 90s to the mid 2000s. These were the tame years, as far as DDoS was concerned. Although it is true that there was some amount of destruction to large online services during this time, it was relatively infrequent and hardly got any sort of the press that it gets today. In this article, I will discuss DDoS over the last 10 years: specifically hacktivism, the rise of Anonymous, the rise in the size of DDoS, and what the future holds as far as DDoS is concerned.

Read More

rsz_linuxlogin2 (1) (1) (1) (1)

Hacking vs. DDoS – A Showdown

By | Blog, Tech News | No Comments

Hacking has really taken on bad meaning over the past two decades. What began as software augmentation on a rapid development cycle has been popularized by movies like “Hackers” and “Swordfish” as underground and often sociopathic perpetration of evil. Interest has again been stirred with the holiday attacks against video game services and the release of the film “Blackhat”, which has since encouraged a lot of confusion through public ignorance of the subject and sensationalism.

The concept of hacking began many decades ago and to this day is used by software developers around the world for its original meaning. Virtually all software developers are hackers. Not all hackers are evil though. According to its widespread definition, a modern day hacker is someone who gains elevated privileges or access to systems and resources, often intercepting data and commandeering systems. A “bad” hacker is a software developer who has malicious intentions, whether or not those intentions are criminalized under law.

On the other hand, DDoS attacks have very little positive use. By its very nature, a distributed denial of service attack is an attack which forces the denial of service to legitimate users or requests. Their main purpose is to cause harm and negative impact. In recent times, some have argued that DDoS attacks are a form of social protest.

Are the perpetrators of DDoS attacks hackers? Do all hackers launch DDoS attacks? Is launching a DDoS attack a form of hacking? Which is worse?

Read More

gaborhejacode (1)

A Brief History of DDoS – Part 1

By | Blog | No Comments

The Internet has become one of the most pervasive things in the lives of modern people. We use it for streaming videos, we talk with friends and family, and we share our day to day experiences with a wider audience than could ever be imagined. Online games and services have become the bread and butter for the entertainment of millions of people world-wide. However, it wasn’t always like this. In fact, it wasn’t like this even 20 years ago.

When the internet was first becoming popular, there wasn’t as much to do online like there is now. During its hey-day in the late 90s, Internet Relay Chat (IRC) was where all of the tech savvy people used to go hang out. Invented in the 1980s, IRC is, as a famous quote puts it, just multiplayer notepad. Like most bored and curious people will do, there were those that learned to manipulate weaknesses in it, and IRC soon became a breeding ground for the bad things one could think of to do on the internet: hacking, software pirating, and Denial of Service attacks.

Read More

rsz_1369968_27456384 (1)

GHOST – Linux Security Hole – DDoS Risk?

By | Blog, Tech News | No Comments

The researchers at Qualys found a widespread bug in the Linux GNU C Library called glibc that affects a wide cross-section of exposed systems on the Internet. The vulnerability allows malicious players to remotely commandeer a system using a technique known as heap buffer overflow. You may remember Qualys from their popular webapp vulnerability reports such as one of the Drupal SQL vulnerabilities they discussed back in October 2014. Qualys provides sound research in this space so this vulnerability should be taken seriously.

The exploit is performed by leveraging a malformed DNS (domain name system) argument to a remote application that performs a DNS lookup, specifically to trigger gethostbyname() which calls __nss_hostname_digits_dots(). The hacker can then initiate the execution of shell code to remotely take over the system, likely elevating them to the root user. Despite the seemingly severe nature of this security hole, the problem was not classified as a high severity security risk, and thus many distributions have not patched the problem. This will undoubtedly result in a large number of compromised machines which will naturally be used for the execution of DDoS attacks and other associated malicious tasks. How severe will the problem be? Are we looking down the barrel of another era of NTP floods?

Read More


New Year, New Look: Updates to the Client Panel

By | Updates | No Comments

Clients may have noticed a couple of updates to your interface when logging into the client panel recently, and we’re happy to say it’s here to stay.

The previous version of our client panel, while functional, was feeling a little bit on the legacy side of the web. As such, we’ve streamlined a few things for convenience and aesthetics. We have brightened things up, improved text visibility, used less buttons, and overall improved the speed of the menus. The inherent structure of the interface remains unchanged, so all the essentials should be in the place you remember it. We’re hoping this will help you be able to focus on your own business and spend less time looking for service controls and features.

As always you have full access to your billing history, traffic usage, and the ability to fine-tune your SecurePort settings according to your needs. While the changes this time have largely been cosmetic, we’re looking to add some informational content for our clients in the near future, including more comprehensive graphs and statistics. If you ever have any questions, need help making revisions, or find a bug, open a ticket and the staff will give you a hand at any time. We’re open to suggestions as well, so if you think there’s a useful or cool feature that improves business, productivity, and your own customer-base, we want to hear about it.

It’s a start for an exciting 2015, and we look forward to improving your experience.

Related Posts

mitigate ddos attacks

Staminus is known for being one of the world’s most reliable DDoS mitigation companies today, thanks to its revolutionary global automated system recovery and replacement software. We mitigate DDoS attacks for a wide range of industries, from healthcare to government to retail. For mission-critical demands, trust only Staminus.

mitigate ddos

Businesses that depend on websites in some form or another—to process and collect information, payments, or transactions—are vulnerable to distributed denial of service attacks, which can cause catastrophic losses. To mitigate DDoS attacks, partner up with Staminus. Have a look at our website to see what we can do for you.

layer 7 ddos protection

A layer 7 DDoS attack is a complicated attack at the OSI Model application layer. They are among the hardest to mitigate because they imitate human behavior while interacting with the user interface, making them hard to separate from regular traffic. Staminus if one of the few companies to offer layer 7 DDoS protection for a wide range of industries, from banking to educational websites.

home ddos protection

There is a growing trend of DDoS attacks on personal computers used in private homes and public places, such as coffee shops and libraries. Attackers know that such computers are least protected and most accessed; moreover, users are not likely to be knowledgeable about the risks of a DDOS attack. If you need home DDoS protection then you need Staminus.

firewall ddos protection

Staminus is an expert in firewall DDoS protection and has been an industry leader for over 15 years. Don’t let distributed denial of service attacks cripple your business like they have countless others. Talk to our firewall DDoS protection experts now to understand how our technology can secure your website against attacks.

denial of service protection

Invest in reliable denial of service protection to save your business from the devastating effects of a DDoS attack. Sign up with industry veterans like Staminus, which serves clients in a range of industries, including government websites, healthcare, charities, educational institutions, and online retail shops.

ddos services

Even the most robust web infrastructures are not immune to DDoS services attacks. If your business uses a website to process critical information such as financial information, transactions, and important data, then you need Staminus. We can protect you from distributed denial of service attacks no matter what your industry. Contact our experts to learn more.

ddos service

Hundreds of websites—from banking to retail and even charities—fall victims to DDoS service attacks on a regular basis. These attacks target sites and services hosted on high-profile servers, including banks, credit card gateways, and root nameservers. Make sure your business is protected from these attacks. Talk to us at Staminus to learn more.

ddos protection services

Not all DDoS protection services are the same. Trust only Staminus if you want to be insulated from distributed denial of service attacks. We operate a globally redundant network of DDoS mitigating infrastructures and believe that redundancy is essential to reliability in mission-critical applications.

ddos protection service providers

As one of the world’s leading DDoS protection service providers, Staminus runs a global infrastructure currently spanning the US and Europe with DDoS mitigation scrubbing centers as well as a network of datacenters in New York, Los Angeles, and Amsterdam. This allows us to effectively mitigate even the largest DDoS attacks and ensure the lowest network latency.

ddos protection hardware

The DDoS protection hardware is the heart and soul of an effective DDoS security company. At Staminus, we built and designed a mitigation network of hardware appliances exclusive to us; these appliances were by our own engineers so that we can leverage the unique features of each client-industry. Talk to us now to see how we can protect you from a distributed denial of service attack.

DDoS Protection

Distributed denial of service attacks have crippled thousands of web-reliant businesses in all manner of industries, from government websites to educational institutions to travel and retail online stores. An attack can cause catastrophic financial losses. Prevent it with DDoS protection from Staminus.

ddos prevention services

If your business relies on a website in some from or another—to accept payments, process data, or sell retail, for example—then you need to invest in DDoS prevention services. Prevent a distributed denial of service attack before it’s too late. Talk to our experts at Staminus to get started.

ddos prevention service

Signing up for a DDoS prevention service is the best way to avert a distributed denial of service attack before it happens. When looking for a DDoS mitigation provider, look for a company that built and developed its own protection hardware, like Staminus. Explore our website to learn more about how we can help you.

DDoS Prevention

Don’t wait for a distributed denial of service attack to bring you down and cause huge financial losses. Sign up for DDoS prevention services now at Staminus. We serve almost all industries, including government, banking, travel and hospitality websites, and even charities. We have been in a leading DDoS mitigation company for over a decade.

ddos mitigation services

If you’ve fallen victim to a distributed denial of service attack, then you need the help of a DDoS mitigation services provider like Staminus. Our company has one of the most advanced networks for DDoS mitigation in the industry today. We cater to a wide range of clients, from educational institutions to banking.

ddos mitigation service

Staminus is a leading DDoS mitigation service provider operating a global hardware-appliance mitigation network. Our appliances were built by our own engineers, in-house; they are designed to battle DDoS attacks. Developing our own appliance platform enables us to leverage unique features and cater to each specific industry.

DDoS Mitigation

If you’ve been hit by a DDoS attack, it’s time to call the experts of Staminus. Our DDoS mitigation and security company now has over 10,000 clients globally from more than 100 countries. Our technology is designed to protect all industries—from VoIP to retail websites—from distributed denial of service attacks.

ddos firewall protection

Staminus provides DDoS firewall protection and remains on the forefront of the fight against distributed denial of service attacks. We have been in the industry for over a decade and have continued to grow our expertise in mitigating DDoS attacks to ensure timely and effective solutions. Our top-of-the-line technologies make us one of the best mitigation providers today.


DDoS are more rampant now more than ever, and they don’t discriminate. From small online retail shops to charities to full-scale data centers, these DDoS attacks have affected countless websites and have resulted in catastrophic financial losses. If you are a victim of a distributed denial of service attack, contact Staminus for immediate help.