BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Outages Result of DDoS Attack” Confirms Bandwidth CEO

Outages Result of DDoS Attack” Confirms Bandwidth CEO

David Morken, CEO of Bandwidth.com, has confirmed that a DDoS attack was responsible for recent outages reported on the site on September 27th. Citing that “a number of critical communications service providers have been targeted by a rolling DDoS attack” in a recent statement, Morken also apologized to those who were significantly impacted and assured users that the issue was being addressed and fixed.

As attacks such as this continue to rise, it’s important for fellow businesses to understand what exactly went wrong and if anything could have been done differently to avoid such a catastrophe. DDoS attacks and similar breaches of security can cause serious damage to business reputations and may even put companies under completely.

Let’s take a closer look at this most recent DDoS attack on Bandwidth.com — an attack that also affected several other communications service providers.

Outages Result of DDoS Attack” Confirms Bandwidth CEO

What Does Bandwidth.com Do?

Before getting into the details of the attack, let’s take a look at the company Bandwidth. Bandwidth.com is a global enterprise cloud communications business. Basically, they are a VoIP (Voice over Internet Protocol) service company.

VoIP solutions companies provide VoIP services (incoming and outgoing communications using the Internet or IP networks instead of telephone systems) to both individual consumers and businesses.

What Is a DDoS Attack?

DDoS stands for distributed denial-of-service. This type of attack essentially corrupts the attack victim’s computer services (usually a website) so that they are unusable. It does this through overwhelming the target site with sham malicious traffic. The site becomes so flooded that it’s unable to operate correctly.

What Should We Know About This DDoS Attack Against Bandwidth.com?

The DDoS attack that occurred in September of 2021 targeted Bandwidth.com, but they weren’t the only victims. In fact, cybercriminals launched several attacks — some of which reached other communications companies as well.

These companies include VoIP.ms, Voip Unlimited, and Voipfone. Several of the targeted DDoS plans included ransomware infections.

Ransomware is malicious software, or malware, that comes with a ransom threat. Effectively, the target must decide if they want to recover access to their computer systems in exchange for paying a large sum of money to the cybercriminal or if they want to figure out a fix on their own and likely risk losing original access to their networks. Sometimes, actual data is on the line, and if the ransom is not paid, data will be lost, stolen, and sold on the dark web, or permanently corrupted.

An Update on Bandwidth.com’s Status

CEO David Morken stated that Bandwidth’s team was working around the clock to minimize the impact of the attack. However, they also admitted that many of their clients and users had already been affected. Multiple MSPs and other clients who use Bandwidth as a host also stated having issues, which were affecting their own systems and clients in a catastrophic cascade effect.

After the initial phase of outages, Bandwidth.com updated its status with several more partial outages. Issues affected both outbound and inbound calling services.

Keeping Your Business Safe From DDoS Attacks

According to recent reports, distributed denial-of-service attacks are on the rise in North America and other places like Europe and Australia. Like it or not, cybercriminals are getting more creative as they target large corporations and businesses in an attempt to steal data, corrupt networks, wreak general havoc, and, of course, make money.

Although it’s not pleasant to consider, it’s best to act as if your business may be targeted by a DDoS attack in the future. Doing so can help orient your purpose when it comes to cybersecurity and will spur you to make the necessary decisions to keep your business safe. Essentially, fear is the worst.

This means reminding yourself and your employees that they should be on the lookout for signs of a cyberattack. Understand and train your staff on phishing scams and other telltale signs of cybercrime.

It also means hiring an MSP that has strength in cybersecurity. Speak to them about their preventive measures regarding DDoS attacks and similar breaches of security. What do they do to prevent these issues, and what do they do when one occurs?

No matter how small your business or what industry you’re in, you can always be the target of cybercrime. Put in the time and energy necessary to keep your business safe from harm.

More Like This

Microsoft & Meta Partner to Integrate Teams and Workplace for Easier Collaboration

Microsoft & Meta Partner to Integrate Teams and Workplace for Easier Collaboration Competing Social Software Giants Offer Customer-Requested Consolidation of the Two Applications’ Best Features Workplace stated in May 2021 that it has reached a milestone of 7 million paying members. Microsoft similarly revealed later that July that its Teams platform had 250 million unique …

Microsoft & Meta Partner to Integrate Teams and Workplace for Easier Collaboration Read More »

Read More

AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities

Original release date: November 17, 2021 Summary Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement multi-factor authentication. • Use strong, unique passwords. Note: this advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, …

AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities Read More »

Read More

How to Pick the Ideal Unified Endpoint Management Platform

Picking the Ideal Unified Endpoint Management Platform Unified endpoint management (UEM) software plays an important role in today’s business world, thanks to significant technological advancements. Over the years, endpoint devices have become more data-intensive, connected, and ubiquitous, despite the security risks associated with the software. Thus, proper management of the devices is a top priority …

How to Pick the Ideal Unified Endpoint Management Platform Read More »

Read More

Windows 11 Tips: How to Get Things Done More Effectively

Windows 11 Tips: How to Get Things Done More Effectively Windows 11 comes with a slick redesign and a comprehensive selection of new features. Although it shares many similarities with Windows 10, the new OS introduces groundbreaking features like Android app integration. The best part is that the operating system brings balance to your personal …

Windows 11 Tips: How to Get Things Done More Effectively Read More »

Read More

A Quintessential Guide to Windows 11 Tips and News

A Quintessential Guide to Windows 11 Tips and News Windows 11 introduces a wide selection of interesting new features capable of transforming the user experience. In addition, the operating system comes with a streamlined design, Android apps integration capabilities, a built-in Microsoft Teams conferencing application, and other notable features. Examples of features that you can …

A Quintessential Guide to Windows 11 Tips and News Read More »

Read More

AA21-291A: BlackMatter Ransomware

Original release date: October 18, 2021 Summary Actions You Can Take Now to Protect Against BlackMatter Ransomware • Implement and enforce backup and restoration policies and procedures. • Use strong, unique passwords. • Use multi-factor authentication. • Implement network segmentation and traversal monitoring. Note: this advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) …

AA21-291A: BlackMatter Ransomware Read More »

Read More