SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Akamai CASE STUDY




                                       Akamai Mitigates Politically Motivated Hacktivist
                                       Attack on Major US Media Organization

                                       The Situation
                                       A major media company was the target of hacktivists that felt the organization was being             INDUSTRY
                                                                                                                                            Media & Entertainment
                                       critical of the Occupy Wall St. movement in the United States. Bent on extracting revenge
                                       and embarrassing the company, the hacktivist group sought to halt the company’s Web
                                                                                                                                            SECURITY SOLUTIONS
                                       operations. With this goal in mind, it launched a large-scale Web-based attack using multiple
                                                                                                                                            •	kamai Web Application Firewall
                                                                                                                                              A
                                       attack strategies including the Low Orbit Ion Cannon attack tool, SQL Injections, and other
                                                                                                                                            •	SiteShield
                                       attack vectors across approximately 20 of the media company’s digital properties. These
                                       attack methods have become common practices for those seeking to take part in a botnet
                                                                                                                                            KEY IMPACTS
                                       attack, and are often associated with one of the world’s largest, most feared computer
                                       hacking groups, Anonymous.                                                                           •	
                                                                                                                                              Stopped over 4 million malicious requests
                                                                                                                                              in 24 hours
                                                                                                                                              Ensured uptime across 19 digital properties
                                                                                                                                            •	
                                       The Challenge                                                                                          Prevents attack traffic from reaching the
                                                                                                                                            •	
                                       Media and entertainment companies have become a key target with the rise of the hacktivist             origin server

                                       movement in 2011. Seeking to make political statements, the hacktivists zero in on high-traffic
                                       media sites. Since these types of sites have just recently found themselves a part of this growing
                                       trend, they are often caught off guard to defend themselves against such attacks.



                                       The Goal
                                       The media company needed to meet two requirements to support its objectives:
                                       •	 revent DDoS attacks: The media company wanted the ability to detect and mitigate
                                         P
                                        threats against its Web site as early as possible.
                                       •	 nsure uninterrupted business: Because the company’s multiple digital properties
                                         E
                                        are a key channel for reaching its audience, it was critical to ensure 24x7 site uptime.




                                       Why Akamai
                                       Stopping Attacks at the Edge
                                       Given the organization’s long-standing relationship with Akamai, and the fact that their Web
                                       infrastructure is highly dependent on the Akamai Intelligent Platform, they contacted Akamai’s
                                       team of security experts. Akamai was able to quickly deploy the necessary security solutions
                                       to match the specific attacks that were expected. Later the team identified the threat as a
                                       coordinated, large-scale DDoS (Distributed Denial of Service).
                                       Akamai deployed its Web Application Firewall (WAF) service in multiple locations, cloaking
                                       the attack traffic, and configured custom rules designed to match the specific attacks that
                                       were expected. By detecting and mitigating potential attacks in HTTP and SSL traffic, WAF
                                       addresses such attacks within the Akamai Platform to ensure they never reach the customer’s
                                       origin data centers.
                                       During the 24 hours of the attack Akamai examined 394 million requests, stopping over
                                       4 million malicious requests. As a result, business continued uninterrupted at the media
                                       company, with no disruptions across 19 of its digital properties.




ctualcommunicationsromackersonoemer
Akamai Mitigates Attack								 		 Akamai CASE STUDY




The Akamai Difference
Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the company’s solutions
is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting
the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the
pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter.




Akamai Technologies, Inc.

U.S. Headquarters                       International Offices
8 Cambridge Center                      Unterfoehring, Germany          Bangalore, India
Cambridge, MA 02142                     Paris, France                   Sydney, Australia                   ©2012 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole
                                                                                                            or in part in any form or medium without express written permission is prohibited.
Tel 617.444.3000                        Milan, Italy                    Beijing, China
                                                                                                            Akamai and the Akamai wave logo are registered trademarks. Other trademarks
Fax 617.444.3001                        London, England                 Tokyo, Japan                        contained herein are the property of their respective owners. Akamai believes
U.S. toll-free 877.4AKAMAI              Madrid, Spain                   Seoul, Korea                        that the information in this publication is accurate as of its publication date;
(877.425.2624)                          Stockholm, Sweden               Singapore                           such information is subject to change without notice.

www.akamai.com

Weitere ähnliche Inhalte

Mehr von Akamai Technologies

Mehr von Akamai Technologies (20)

3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case StudyEdge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
 
Edge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format TodayEdge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format Today
 
Edge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance MonitoringEdge 2014: A Modern Approach to Performance Monitoring
Edge 2014: A Modern Approach to Performance Monitoring
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Global Media Company Website Attack Case Study - Akamai Kona

  • 1. Akamai CASE STUDY Akamai Mitigates Politically Motivated Hacktivist Attack on Major US Media Organization The Situation A major media company was the target of hacktivists that felt the organization was being INDUSTRY Media & Entertainment critical of the Occupy Wall St. movement in the United States. Bent on extracting revenge and embarrassing the company, the hacktivist group sought to halt the company’s Web SECURITY SOLUTIONS operations. With this goal in mind, it launched a large-scale Web-based attack using multiple • kamai Web Application Firewall A attack strategies including the Low Orbit Ion Cannon attack tool, SQL Injections, and other • SiteShield attack vectors across approximately 20 of the media company’s digital properties. These attack methods have become common practices for those seeking to take part in a botnet KEY IMPACTS attack, and are often associated with one of the world’s largest, most feared computer hacking groups, Anonymous. • Stopped over 4 million malicious requests in 24 hours Ensured uptime across 19 digital properties • The Challenge Prevents attack traffic from reaching the • Media and entertainment companies have become a key target with the rise of the hacktivist origin server movement in 2011. Seeking to make political statements, the hacktivists zero in on high-traffic media sites. Since these types of sites have just recently found themselves a part of this growing trend, they are often caught off guard to defend themselves against such attacks. The Goal The media company needed to meet two requirements to support its objectives: • revent DDoS attacks: The media company wanted the ability to detect and mitigate P threats against its Web site as early as possible. • nsure uninterrupted business: Because the company’s multiple digital properties E are a key channel for reaching its audience, it was critical to ensure 24x7 site uptime. Why Akamai Stopping Attacks at the Edge Given the organization’s long-standing relationship with Akamai, and the fact that their Web infrastructure is highly dependent on the Akamai Intelligent Platform, they contacted Akamai’s team of security experts. Akamai was able to quickly deploy the necessary security solutions to match the specific attacks that were expected. Later the team identified the threat as a coordinated, large-scale DDoS (Distributed Denial of Service). Akamai deployed its Web Application Firewall (WAF) service in multiple locations, cloaking the attack traffic, and configured custom rules designed to match the specific attacks that were expected. By detecting and mitigating potential attacks in HTTP and SSL traffic, WAF addresses such attacks within the Akamai Platform to ensure they never reach the customer’s origin data centers. During the 24 hours of the attack Akamai examined 394 million requests, stopping over 4 million malicious requests. As a result, business continued uninterrupted at the media company, with no disruptions across 19 of its digital properties. ctualcommunicationsromackersonoemer
  • 2. Akamai Mitigates Attack Akamai CASE STUDY The Akamai Difference Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter. Akamai Technologies, Inc. U.S. Headquarters International Offices 8 Cambridge Center Unterfoehring, Germany Bangalore, India Cambridge, MA 02142 Paris, France Sydney, Australia ©2012 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Tel 617.444.3000 Milan, Italy Beijing, China Akamai and the Akamai wave logo are registered trademarks. Other trademarks Fax 617.444.3001 London, England Tokyo, Japan contained herein are the property of their respective owners. Akamai believes U.S. toll-free 877.4AKAMAI Madrid, Spain Seoul, Korea that the information in this publication is accurate as of its publication date; (877.425.2624) Stockholm, Sweden Singapore such information is subject to change without notice. www.akamai.com