|
In an after-action analysis of the Mirai botnet attacks on Dyn, business intelligence firm, Flashpoint has assessed with “a moderate degree of confidence” that the perpetrators behind the attack were most likely not politically motivated, and most likely not nation-state actors.
— No publicly available indicators of extortion: “Typically, financially motivated DDoS attacks will target business competitors, online gambling sites, or Bitcoin exchanges. Attackers can also use DDoS attacks or threats to extort money from businesses that would be affected by an outage. Despite various groups claiming responsibility for the attack, there have been no publicly available indicators of extortion—attempted or not—against Dyn DNS or any of the sites affected by the attack.”
— Discounting political motivations: “Dyn DNS is a central target whose outage would affect a wide variety of website and online services, and does not disproportionately affect any one political entity. Such a broad scope of targeting does not lend itself to a politically motivated attack. Additionally, the indicators that we do have point to specific communities that have historically been apolitical.”
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC