Amazon Web Services was the victim of a DDoS attack earlier this week. Its services remained inaccessible for almost eight hours …
Amazon Web Services users suffered a major outage earlier this week following a DDoS attack . Several Cloud services, including the S3 storage service, remained deactivated for almost 8 hours.
The attack hit Amazon’s Router 53 DNS web service, and then spilled over to other services such as Elastic Load Balancing (ELB), Relational Database Service (RDS) and Elastic Compute Cloud (EC2). Users were informed by message that the DNS servers were undergoing a DDoS attack.
Amazon Web Services and Google crashed at the same time
This incident calls into question the effectiveness of Amazon Web Services’s mitigation platform , Shield Advanced. While it is supposed to protect servers, this platform would have had the opposite effect by preventing clients from connecting. Indeed, the mitigation tool absorbed the majority of traffic, but also confused the requests of legitimate customers with fraudulent connection attempts.
At the same time, the Google Cloud Platform also experienced the same type of problem with a failure around the same time. The problem affected Google Compute Engine, Cloud Memorystore, Google Kubernetes Engine, Cloud Bigtable and Google Cloud Storage. However, the cause this time was not a DDoS attack.
Although they are not linked, these two incidents demonstrate that the Cloud is not yet foolproof in terms of security . Even the main suppliers can be victims of cyber attacks or accidental breakdowns, which can be very problematic for their customers…