DDoS Attack on DoubleClick Slows Many Sites

DoubleClick says its banner ad network was disrupted today by a distributed denial of service (DDoS) attack on its domain name servers. As DoubleClick's DNS servers became unreachable, the attack had a ripple effect, leaving many of the network's 900 client sites unable to retrieve banners from DoubleClick's ad servers. The company said the attack lasted about four hours and caused "severe disruptions" for customers.

In most cases, sites responded slowly as they struggled to load DoubleClick banners. The Washington Post was among the sites that removed DoubleClick's ad code from its pages until the attack concluded. DoubleClick uses at least four nameservers to direct traffic on its ad network.

The attack was similar in concept to a June 15 attack on Akamai, which also targeted DNS servers and caused downtime for major sites relying on Akamai's network services. In both cases, attackers were able to focus their attacks on a service provider and use it to amplify the effect of their efforts.

Akamai cited a bot network of compromised servers as the culprit in the June 15 attacks. DoubleClick said it was taking steps to prevent a recurrence.