November 13, 2018
Google users were last night reporting that some services were slow or unavailable, thanks to traffic being misdirected through ISPs in China, Nigeria, and Russia.
It's the latest of several incidents that have involved the misdirection of traffic via China Telecom. But while some security experts believe that it's a deliberate tactic from the state-owned telecom company, Google says it has no reason to believe that the problem was anything other than an accident.
April 18, 2018
Russia’s attempts to ban access to the Telegram messaging service threaten to drag U.S. tech giants including Alphabet Inc. and Amazon.com Inc. into the war with founder Pavel Durov as he turns to proxy servers to bypass the blocking measures.
Russian communications regulator Roskomnadzor has already blocked 18 Google and Amazon sub-networks that Telegram used to avoid restrictions, the watchdog’s head Alexander Zharov told the Izvestia daily on Wednesday. More than 15 million IP addresses were blocked as a result, making some third-party internet resources unavailable in Russia, according to Qrator Labs.
April 16, 2018
Russia is using compromised computer-network equipment to attack U.S. and British companies and government agencies, the two countries warned in an unprecedented joint alert.
The warning on Monday came from the U.S. Department of Homeland Security and Federal Bureau of Investigation and Britain’s National Cyber Security Center. It included advice to companies about how to protect themselves and warned specifically of attacks on routers, the devices that channel data around a network.
“Russian state-sponsored actors are using compromised routers to conduct spoofing ‘man-in-the-middle’ attacks to support espionage, extract intellectual property, maintain persistent access to victim networks and potentially lay a foundation for future offensive operations,” according to a joint statement. “Multiple sources including private and public-sector cybersecurity research organizations and allies have reported this activity to the U.S. and U.K. governments.”
The main advice offered Monday for individuals and companies: Make sure that your router software is up-to-date and its password is secure.
“Once you own the router, you own the traffic,” Jeanette Manfra, assistant secretary at the Department of Homeland Security, told reporters on a joint conference call.
October 31, 2017
Qrator is one of Eastern Europe’s most widely used and highly regarded Distributed Denial of Service mitigation service providers. Following major international expansion, Qrator has upgraded its critical infrastructure to innovative software and Arista Networks technology which has offered an efficient, scalable and cost-efficient foundation for future innovation whilst delivering critical levels of reliability.
With the fundamental technical limitations overcome and the Arista switching layer providing both the performance and reliability demanded of the Qrator service, the company began rolling out Arista switches to all of its PoPs. With the custom created daemons and Qrator software running within each switch, the service is also able to deliver the custom telemetry it needs to identify and block DDoS attacks. According to Head of Qrator Labs NOC, the goals of the upgrade project have been comfortably met, and the choice of using Arista layer 3 switching has proven a viable foundation for continued expansion. “Just looking at the Arista switch utilisation and reliability, we now have an uptime of more than 1000 days- it just doesn’t drop,” says Dmitry Shemonaev, “We had an accident in January of 2016 when a switch lost its memory (NAND flash), and although it continued working we had to restart it.”
June 19, 2017
One of the most persistent bugs in Internet infrastructure, route leaks in the border gateway protocol (BGP), is in the sights of a group of 'net boffins and their with a new Internet-Draft.
BGP's one of the Internet's persistent trouble-spots: ineradicable because it's ubiquitous, it's vulnerable because it's ancient, a relic of a collegiate Internet in which admins knew each other by name.
Because it predated a global Internet inhabited by bad and good actors, BGP trusts the messages it receives – making it a cinch for someone to black out slabs of the 'net either through malice, or because their thumbs are bigger than their keys.