Tag Archive for cloud
As per reports, a telecommunication provider that is owned by Russia rerouted traffic which was intended for the most imminent Content Delivery Networks (CDNs) and cloud host providers of the globe.
The entire re-direction kept on for around an hour during which it affected over 8,500 traffic routes of the internet. The concerned organizations happen to be few of the most celebrated ones.
Per sources, the brands range across well-known names like Cloudflare, Digital Ocean, Linode, Google, Joyent, Facebook, LeaseWeb, Amazon, GoDaddy, and Hetzner.
Reportedly, all the signs of this attack indicate towards its being a case of hijacking the Border Gateway Protocol, also known as, BGP hijacking. It is the illegitimate takeover of IP prefixes by a hijacker to redirect traffic.
This gives a lot of power in the hands of the hijacker because they could at any time “publish an announcement” stating that the servers of a particular company are on their network. As a result of which all of e.g. Amazon’s traffic would end up on the hijacker’s servers.
In earlier times when Hypertext Transfer Protocol wasn’t as widely used to encrypt traffic, BGP hijacking was a lucrative way to carry Man-in-the-Middle (MitM) attacks and catch and modify traffic.
But in recent times, analysis and decryption of traffic later in time has become easier because of BGP hijacking, as the encryption gets weaker with time.
This predicament isn’t of a new kind. It has been troubling the cyber-world for a couple of decades, mainly because they aim at boosting the BGP’s security. Despite working on several projects there hasn’t been much advancement in improving the protocol to face them.
Google’s network has been a victim of BGP hijacking by a Nigerian entity before. Researchers mention that it is not necessary for a BGP hijacking to be malicious.
Reportedly, “mistyping the ASN” (Autonomous System Number) is one of the other main reasons behind a BGP hijacking, as it is the code via which internet units are recognized and ends up accidentally redirecting traffic.
Per sources, China Telecom stands among the top entities that have committed BGP hijacking, not so “accidentally”. Another famous one on a similar front is “Rostelecom”.
The last time Rostelecom seized a lot of attention was when the most gigantic of financial players were victimized by BGP hijacking including HSBC, Visa, and MasterCard to name a few.
The last time, BGPMon didn’t have much to say however this time, Russian Telecom is in a questionable state, per sources. They also mention that it is possible for the hijack to have occurred following the accidental exposure of the wrong BGP network by an internal Rostelecom traffic shaping system.
Things took a steep turn when reportedly, Rostelecom’s upstream providers re-publicized the freshly declared BGP routes all across the web aggravating the hijack massively.
Per researchers, it is quite a difficult task to say for sure if a BGP hijacking was intentional of accidental. All that could be said is that the parties involved in the hijack make the situation suspicious.
I have been managing in house Linux, mac and Windows servers for various clients for years . different clients need different features with low cost .
After introducing myself into the world of Cloud Storage , I am doing SaaS and cloud storage effectively. I prefer doing cloud storage in local geographic locations as it becomes hard to get initial data of 500GB offsite.
these are the benefits of cloud computing i have found
- Maintain easy access to your information with minimal upfront cost. Pay as you go (monthly or yearly), based on demand.
- There’s no need to spend big money on hardware, data center, software or licensing fees.
- Stretch and grow without the need to buy expensive software licenses or programs. (normal cloud SaaS license is something like 1-5 users)
- You can change direction without serious “people” or “financial” issues at stake. – that improve flexibility
- You have access anytime, anywhere, making your life so much easier! (as long as you are online)
- increase volume output or productivity with fewer people. Your cost per unit or project
- Software updates and renewals are also handled by the cloud vendor and occur several times a year at no cost to the customer.
- on-premise solutions require 2-3 years to implement but cloud solution will only take 2-3 months. Not only is implementation time reduced, but the IT resources required to roll-out cloud solutions are much less.
- With cloud deployments, capacity and location planning are no longer in the hands of the customer, but are the responsibility of the cloud vendor. This allows companies to respond quickly to any business changes that may arise unexpectedly
- SECURITY: One of the top concerns of cloud skeptics is the fear of sacrificing data security when allowing company data to exist outside the internal firewall. well with proper Encryption methods, user policies and regular security audits. So no more worrying about lost laptops with confidential data and hacking threats.
- Since all your data is stored in the cloud, backing it up and restoring the same is relatively much easier than storing the same on a physical device.
www.soleclouds.com and SaaS service on www.radonit.com