DNS Attack Downs DoubleClick

    July 28, 2004

On Tuesday DoubleClick, online marketing and advertising provider, received a flood of fraudulent web page requests, creating a bottleneck that blocked many major sites from displaying their appropriate advertising.

The massive attack began around 10:30 a.m. Eastern Time Tuesday, according to pcworld.com. DoubleClick’s domain name system (DNS) servers were the target of the attack. Virus infected computers were used to bombard the company with fake page requests.

The attack that crippled DoubleClick caused a ripple effect across the Internet. Numerous web pages struggled to retrieve any ads from the company’s ad servers.

Discuss this topic and many others at WebProWorld, the WebProNews forum.

Jeremy Muncy is a staff writer for WebProNews.com