Managing director at UK2.NET Martin Baker told The Register on Thursday that it had never seen a DDoS attack of this scale on its network. According to Baker, UK2.NET saw around 10 million unique IPs attack last night.
The botnet attack its DNS servers, so sites were up or down depending on when requests for pages were made, Baker says.
Customers started to see problems in the afternoon, but the peak of the attack was around midnight. UK2.NET says it was able to get it off its network at around 3 am.
Since UK2.NET has dealt with DDoS attacks before, it should have a better system in place for communicating issues with customers. Its Twitter status page only shows two updates from the past 7 hours, and only one other tweet addresses three customers about the issue. In that tweet, it directs customers to its status page, which is also quite sparse. The latest update on its status page says the intermittent access to DNS was rectified last night and it only affected a “small number of domains using these servers for DNS lookups.”
In a recent report, DDoS protection firm Prolexic Technologies said it is crucial for companies to have a “playbook”, or a rehearsed and tested plan that outlines who in an organization needs to be involved in the event of a DDoS attack, and a detailed communication strategy.
Web hosts can partner with DDoS mitigation providers to help keep customer sites secure. Recently, DDoS protection provider Black Lotus launched its reseller program for web hosts, and on Tuesday, Fortinet launched its FortiDDoS product suite for web hosting and cloud providers.
In April 2011, private equity firm Lloyds TSB Development Capital acquired a majority stake in UK2 Group in a transaction valued at about $77 million.
Talk back: What have you learned from mitigating your own DDoS attacks? How do you communicate DDoS attacks to customers? Let us know in the comment section.