LinkedIn DDoS response botched

By
Follow google news

Users redirected to insecure site.

More than half of Linkedin's members were knocked off the service for an extended period yesterday following a botched response to a DDOS by service provider Network Solutions. 

LinkedIn DDoS response botched

Users were redirected in error to India-based website confluence-networks.com which did not require Secure Sockets Layer connections meaning users' cookies were sent in clear text.

Initial media reports suggested the company's DNS had been hijacked and user security potentially compromised as user's cookies may have been visible as plain text during the outage. 

Linkedin subsequently confirmed on Twitter that the outage was due to human error not malice.

"Yesterday's issue was not malicious in any way It was an error by the company that manages our domain," the statement said.

In a post on its site the company claimed LinkedIn member data was not compromised.

Fidelity.com also fell foul of the same redirect error, according to reports.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © nextmedia Pty Ltd. All rights reserved.
Tags:

Most Read Articles

Supply chain attack hits 100 million-download Axios npm package

Supply chain attack hits 100 million-download Axios npm package

NAB is co-designing a SIEM with Databricks

NAB is co-designing a SIEM with Databricks

APRA pulls data submission system after security pentest

APRA pulls data submission system after security pentest

Councils push for federal shared security centre funding

Councils push for federal shared security centre funding

Log In

  |  Forgot your password?