Online attackers have briefly disrupted service on at least two of the 13 “root” servers that are used to direct traffic on the Internet.The attack, which began Tuesday at about 5:30 a.m. Eastern time, was the most significant attack against the root servers since an October 2002 distributed denial-of-service (DDoS) attack, said Ben Petro, senior vice president of services with Internet service provider Neustar. Root servers manage the Internet’s Domain Name System (DNS), used to translate Web addresses such as Amazon.com into the numerical IP addresses used by machines.The attack appeared to have been launched by a group of compromised PCs, called a botnet, Petro said. “Two of the root servers suffered badly, although they did not completely crash; some of the others also saw heavy traffic,” said John Crain, chief technical officer with the Internet Corporation for Assigned Names and Numbers (ICANN), in an e-mail interview.The two hardest-hit servers are maintained by the U.S. Department of Defense and ICANN, he added. The botnet briefly overwhelmed these servers with useless requests, causing them to occasionally hang, but did not disrupt Internet service, Petro said. By 10:30 a.m., ISPs were able to filter enough of the traffic from the botnet machines that traffic to and from the root servers was essentially back to normal.Compared to other DDoS attacks, this one did not have a lot of firepower. Petro said the bandwidth of the attack could be measured in megabytes, as opposed to the gigabyte-level attacks that are now frequently seen. “It was a small attack, but it was focused and targeted at the roots,” he said.It is unclear where the attack originated, Crain said. “The effect of this traffic on the end users was negligible,” he added.Petro said engineers are still “scratching their heads” about the reason for the attack. Although some DDoS attacks are launched for political reasons or to extort money from website owners, this one appeared to have no such purpose, he said.Crain ventured a guess as to the attack’s effect, however. “I suspect that the largest effect of the DNS traffic was to deprive some engineers of sleep and generate press,” he wrote.-Robert McMillan, IDG News Service (San Francisco Bureau) Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe