From December 14 – 21 a massive DDoS attack was launched against the internet servers of Turkey which took an estimated 400,000 web pages offline over the period. If that information alone is not impressive enough for you, the DDoS attack was recorded at 40gbs. This information may not mean much to you but they average DDoS attack is estimated to occur around 8 gbs. This was the largest DDoS attack in the countries history. After the attack ended on December 21st Anonymous released a video and statement claiming responsibility for the hack and warned of future action to come.
Anonymous Official Press Release To Turkish Government Leaders:
“As many of you have heard, Turkey is supporting Daesh [Isis] by buying oil from them and hospitalizing their fighters.”
“We won’t accept that Erdogan, the leader of Turkey, will help Isis any longer. The news media has already stated that Turkey’s internet has been the victim of massive DDoS attacks.”
“Dear Government of Turkey, if you don’t stop supporting Isis, we will continue attacking your internet, your root DNS [the foundation of Turkey’s internet], your banks and take your government sites down.
After the root DNS we will start to hit your airports, military assets and private state connections. We will destroy your critical banking infrastructure.”
“Stop this insanity now, Turkey. Your fate is in your hands.”
How The DDoS Attack Worked
All domain names that end with Turkey’s two-letter country code .tr must be registered by NIC.tr, an administration office in Turkey’s capital of Ankara. Besides its registration duties, NIC.tr maintains the academic internet backbone for Turkish universities. It’s also the main service for .tr domain names.
By noon December 14, NIC.tr’s five nameservers, ns1.nic.tr through ns5.nic.tr, were completely down under a 40 Gigabits per second DDoS attack.Europe’s regional Internet registry, the RIPE Network Coordination Centre, serves as a secondary Domain Name System to Nic.tr. RIPE was also severely affected.
What makes the Turkish attack so damaging is the attackers’ sophisticated choice of target. By focusing on a relatively small group of IP addresses, the five nameservers of NIC.tr, the attackers managed to “take down the DNS system of a whole country with a 40 Gbps attack:”
As the country’s official domain suffix, .tr domain names are very popular in Turkey, and many local companies want their businesses officially recognized for their local audience. There are about 400,000 websites with localized Turkish domain names, including 300,000 companies. It’s also used by government institutions, schools, municipalities, Turkish e-mail servers, and the Turkish military.
The attack was only stopped when the Turkish cyber-security agency stopped all foreign internet traffic from accessing Turkish websites, essentially closing the country’s digital borders to the outside world.
*Source: http://www.dailydot.com/ *
Last October AnonHQ wrote about a similar attack promised by the notorious group Red Hack and chronicled some of the issues facing the country of Turkey: https://anonhq.com/redhack-threatens-hand-back-government-to-the-people/
AnonHQ News reached out to our sources of the article ^^^ and was informed there was no direct connection between the November 1st attack at the December 14th attack.
RedHack However Was Active During This Same Timeline: https://anonhq.com/hacker-team-redhack-shocks-turkey/
Prime Minister of Iraq Claims ISIS Smuggles Majority of Oil Through Turkey: https://anonhq.com/41938-2/
Syrian Army Re-Captures Oil Route Along Border With Turkey: https://anonhq.com/43040-2/
This article “How Anonymous Hacked Turkeys Internet” is free and open source. You have permission to republish this article using a creative commons license with attribution to the author and AnonHQ. Join the conversations at www.anonboards.com