FastMail suffers DDoS Attack

FastMail a renowned web service company become the latest victim of a group of unknown hackers, who took down its services with a DDoS (denial of service) attack this week. The group is demanding extortion from the web service provider which is believed to be around of around $7,500.

This is the second DDoS attack the company has suffered with in days according to the official blog post published by the FastMail. The company suffered the first attack on Sunday followed by the second attack just 24 hours later.

In an official announcement the web service provider refuses to respond to the extortion demands of these cyber criminals, but warned its customers that they may face some disturbance in the services over the period of 7 days.

FastMail is not the first web service provider who has been targeted with a DDoS attack. In recent times we have seen some other major web service providers like; Hushmail, Zoho, RunBox and Protonmail with same kind of attacks.

The company told their customers on their official blog that they are taking all the necessary steps to stop these attacks in future.  The company also appreciated their patience of their customers and ensures them that their security teams are taking all the necessary steps to avoid such attacks in future.
DDoS attack takes place when an attacker with a help of multiple systems (botnets) diverts the traffic on a targeted system which causes the service to go offline. These attacks are pretty easy to organize and considered very cheap in the eyes of security researchers.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...