Amazon Web Services' Router 53 domain name system (DNS) service was waylaid by a prolonged distributed denial of service attack earlier this week, affecting a number of online sites and services that rely on AWS.
According to multiple reports, a flood of fake traffic disrupted legitimate attempts to resolve DNS requests to connect to Amazon cloud-hosted storage buckets and systems. The incident took place on Oct. 22 and stretched from around 1:30 p.m. ET to 9:30 p.m. ET, Amazon disclosed in a service update, according to reports. And at 8:16 p.m. ET, Amazon observed a very small sampling of specific DNS names that experienced a higher error rate.
"We're investigating reports of intermittent DNS resolution errors with Route 53 & our external DNS providers," AWS Support tweeted on Oct. 22 at 1:06 p.m. ET. Later, at 9:30 p.m., AWS Support tweeted that "The AWS DNS issues that may have affected your experience with Route 53 or our external DNS providers has been resolved."
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.