Microsoft’s DDoS Defense Misstep Intensifies Azure Service Outages


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!




Error in Microsoft’s DDoS Defence Causing Increased Azure Service Disruptions

Error in Microsoft’s DDoS Defence Causing Increased Azure Service Disruptions

A recent error in Microsoft’s DDoS defence has led to major disruptions within Azure and Microsoft 365 services. Below is an analysis of what happened and its implications for Australian companies depending on these services.

Microsoft's DDoS Defense Misstep Intensifies Azure Service Outages


Quick Overview

  • Microsoft encountered a DDoS attack impacting Azure Front Door and Azure CDN services.
  • An error in the DDoS defence setup magnified the effects of the attack.
  • Services impacted included Microsoft 365, Purview, App Services, among others.
  • Problems lasted from 9:45pm AEST to 5:43am AEST.
  • A detailed preliminary report on the incident is expected to be published by Microsoft soon.

Insights into the DDoS Attack

A DDoS attack aims to disrupt a service by inundating it with excessive traffic. In this case, it targeted Microsoft’s content delivery frameworks, Azure Front Door, and Azure CDN. DDoS attacks can dramatically affect service availability, causing outages and interruptions.

Flaw in DDoS Defence Execution

Microsoft’s DDoS protection features activated as anticipated due to the assault. However, a flaw in the setup of these defences unintentionally increased the attack’s effects instead of lessening them. This flaw resulted in broader service outages than were initially expected.

Service Issues and Resolution

Problems commenced at 11:45 UTC (9:45pm AEST) and were rectified by 19:43 UTC (5:43am AEST). Services impacted included a portion of Microsoft 365, Purview, App Services, Application Insights, and the Azure portal itself. Microsoft addressed the issue by modifying network configurations and executing failovers to alternative networking routes.

Next Steps and Detailed Analysis

Microsoft has pledged to issue a more in-depth preliminary post-incident report later in the week. This report is expected to provide further insights into the cause of the error and outline the steps taken to avert similar incidents in the future.

Recap

An error in Microsoft’s implementation of its DDoS defences during a recent attack led to intensified service disruptions across Azure and Microsoft 365 services. Although the issues have been resolved, a comprehensive report is anticipated to clarify the incident and suggest future preventive actions.

Q&A

Q: What constitutes a DDoS attack?

A:

A DDoS (Distributed Denial-of-Service) attack refers to overwhelming a network or service with a surge of internet traffic, rendering it inaccessible to legitimate users.

Q: Which Microsoft services were impacted by the recent DDoS attack?

A:

The impacted services encompassed Azure Front Door, Azure CDN, a portion of Microsoft 365 offerings, Purview services, App Services, Application Insights, and the Azure portal.

Q: How long did the service disruptions persist?

A:

The disruptions began at 11:45 UTC (9:45pm AEST) and concluded by 19:43 UTC (5:43am AEST).

Q: What measures did Microsoft take to resolve the problem?

A:

Microsoft implemented network configuration amendments to bolster DDoS protection efforts and initiated failovers to alternative networking routes for relief.

Q: Will Microsoft share additional details about the incident?

A:

Indeed, Microsoft is expected to issue a detailed preliminary post-incident report later in the week.

Q: How can businesses safeguard themselves against DDoS attacks?

A:

Businesses can enhance protection by deploying strong DDoS protection systems, sustaining redundant network pathways, and using comprehensive monitoring tools to identify and mitigate attacks promptly.

Posted by David Leane

David Leane is a Sydney-based Editor and audio engineer.

Leave a Reply

Your email address will not be published. Required fields are marked *