Dear GetResponse Customer, As you may know, GetResponse has had a pretty rough weekend… We suffered a major outage caused by a DDoS (distributed denial of service) attack on an unprecedented scale, which has flooded our network and our data center (Windstream) with malicious traffic.
A Message from Simon Grabowski CEO of GetResponse -
161
Dear GetResponse Customer,
As you may know, GetResponse has had a pretty rough weekend… We suffered a major outage caused by a DDoS (distributed denial of service) attack on an unprecedented scale, which has flooded our network and our data center (Windstream) with malicious traffic.
On Saturday, after hours of working together with our data center Windstream (including their directors and VP-level executives), we received information that they have failed to mitigate the attack and of their decision to block our network connectivity until a powerful DDoS mitigation service can be fully implemented.
When GetResponse went down, the morale of the GetResponse community didn’t. We saw an amazing display of support and we would like to thank our customers for rooting for us.
We brought many of the services back online on Sunday (websites, web subscriptions, API, web forms, surveys, landing pages). We had another attack on Monday, but we fully mitigated it, with no downtime, thanks to our new mitigation solution.
We are still working on resolving the issues with email delivery and anticipate to have a complete resolution within the next couple of days. We are literally working on this around the clock, with involvement of VP-level executives from our data center and DDoS mitigation partners.
Over last 15 years we have repelled many DDoS attacks using our infrastructure. More recently, we employed CloudFlare Enterprise solution that has helped us to deal with previous attacks in March and April. Unfortunately, the scale of last weekend’s attack has been so huge that it overran our current mitigation solution, and we needed to come up with a new plan.
After a conference call with our data center, within minutes we got in touch with Akamai, the world’s leading DDoS mitigation provider, with 1.8 Tbps mitigation bandwidth. We asked them to deploy an “always on” clean-pipe DDoS scrubbing service for GetResponse. This is the most advanced type of protection available on the market (also most expensive). It scrubs all inbound traffic for malicious packets of data and returns only “clean” traffic to our data center.
In total, we are spending close to half a million dollars in mitigation solutions, hardware, connectivity and other upgrades.
This wasn’t the first attack that GetResponse has encountered recently. We endured several other attacks in March and April. And we weren’t alone…
Over the last two months this criminal has targeted many other large Internet companies, putting them offline as a consequence. These include Meetup, Shutterstock, MailChimp, Fotolia, Basecamp, oDesk, SurveyGizmo, MadMimi, OkCupid, HootSite, Typepad, Elance, Aweber and others. It is unfortunate, but these types of attacks are becoming much more frequent in today’s environment.
Why would anyone attack well-meaning companies disrupting their business?
This email explains it all:
I sincerely apologize for this outage. We care about you, our customers, and we know that you rely on us to get your emails out to the world. Since the attacks, we’ve been working day and night to get the mitigation in place.
I thank you for your trust, your support and your loyalty during these difficult moments.
Regards,
Simon Grabowski
CEO
GetResponse
PS.: If you have any questions about this issue, please contact our Customer Service at support.getresponse.com (GetResponse 360 customers, please contact your Account Managers)..
As you may know, GetResponse has had a pretty rough weekend… We suffered a major outage caused by a DDoS (distributed denial of service) attack on an unprecedented scale, which has flooded our network and our data center (Windstream) with malicious traffic.
On Saturday, after hours of working together with our data center Windstream (including their directors and VP-level executives), we received information that they have failed to mitigate the attack and of their decision to block our network connectivity until a powerful DDoS mitigation service can be fully implemented.
When GetResponse went down, the morale of the GetResponse community didn’t. We saw an amazing display of support and we would like to thank our customers for rooting for us.
We brought many of the services back online on Sunday (websites, web subscriptions, API, web forms, surveys, landing pages). We had another attack on Monday, but we fully mitigated it, with no downtime, thanks to our new mitigation solution.
We are still working on resolving the issues with email delivery and anticipate to have a complete resolution within the next couple of days. We are literally working on this around the clock, with involvement of VP-level executives from our data center and DDoS mitigation partners.
Over last 15 years we have repelled many DDoS attacks using our infrastructure. More recently, we employed CloudFlare Enterprise solution that has helped us to deal with previous attacks in March and April. Unfortunately, the scale of last weekend’s attack has been so huge that it overran our current mitigation solution, and we needed to come up with a new plan.
After a conference call with our data center, within minutes we got in touch with Akamai, the world’s leading DDoS mitigation provider, with 1.8 Tbps mitigation bandwidth. We asked them to deploy an “always on” clean-pipe DDoS scrubbing service for GetResponse. This is the most advanced type of protection available on the market (also most expensive). It scrubs all inbound traffic for malicious packets of data and returns only “clean” traffic to our data center.
In total, we are spending close to half a million dollars in mitigation solutions, hardware, connectivity and other upgrades.
This wasn’t the first attack that GetResponse has encountered recently. We endured several other attacks in March and April. And we weren’t alone…
Over the last two months this criminal has targeted many other large Internet companies, putting them offline as a consequence. These include Meetup, Shutterstock, MailChimp, Fotolia, Basecamp, oDesk, SurveyGizmo, MadMimi, OkCupid, HootSite, Typepad, Elance, Aweber and others. It is unfortunate, but these types of attacks are becoming much more frequent in today’s environment.
Why would anyone attack well-meaning companies disrupting their business?
This email explains it all:
We weren’t interested, and won’t ever be, even if they continue to attack us. The low “offer” ($750) was just bait, and we know they’d come back for more. Paying would only encourage them to attack other companies. Besides, we are confident that we can protect ourselves in the future with the mitigation plan we’ve put in place. But above all, paying criminals is simply the wrong thing to do.
I sincerely apologize for this outage. We care about you, our customers, and we know that you rely on us to get your emails out to the world. Since the attacks, we’ve been working day and night to get the mitigation in place.
I thank you for your trust, your support and your loyalty during these difficult moments.
Regards,
Simon Grabowski
CEO
GetResponse
PS.: If you have any questions about this issue, please contact our Customer Service at support.getresponse.com (GetResponse 360 customers, please contact your Account Managers)..
- RichardF
- [ 1 ] Thanks
- jamescanz
- [ 1 ] Thanks
- Mark Hess
- [2] replies
- glennshep
- MickK
- [ 4 ] Thanks
- [1] reply
- bluecoyotemedia
- [1] reply
- ejullya
- [2] replies
- Sarevok
- [ 1 ] Thanks
- Brent Stangel
- [ 1 ] Thanks
- [2] replies
- MickK
- [ 1 ] Thanks
- sonjay
- bogomil22
- [1] reply
- Renee Baumgartner
- [ 1 ] Thanks
- rgb
- usixly
- [1] reply
- TimCastleman
- [ 1 ] Thanks
- gesman
- [ 1 ] Thanks
- [1] reply
- MickK
- [1] reply
- stanton
- [ 3 ] Thanks
- zapseo
- [ 1 ] Thanks
- [1] reply
- MickK
- [ 1 ] Thanks
- [1] reply
- Mark Tandan
- Mark Hess
- [3] replies
- MickK
- [ 1 ] Thanks
- MickK
- [ 2 ] Thanks
- MickK
- RedHat39
- [ 1 ] Thanks
- [1] reply
- gesman
- [ 3 ] Thanks
- humbledmarket Banned
- [ 1 ] Thanks
- [1] reply
- MickK
- [1] reply
- jasondinner
- [3] replies
- MickK
- [ 1 ] Thanks
- zapseo
- [ 5 ] Thanks
- [2] replies
- MickK
- [1] reply
- Tim Franklin
- GarrieWilson
- [1] reply
- jasondinner
- [ 1 ] Thanks
- houseaz
- Super Affiliate
- RyanLB
- Disruption
- [1] reply
- marciayudkin
- [1] reply
- barbling
- [ 1 ] Thanks
- zedsta
- [2] replies
- Stevie C
- [ 1 ] Thanks
- MickK
- [ 2 ] Thanks
- SeoApprentice
- [ 1 ] Thanks
- [1] reply
- MickK
- workoutstuff1
- gcbmark20
- [ 3 ] Thanks
- DURABLEOILCOM
- [ 1 ] Thanks
- ecoverartist
- Max Anderson
- SallyJo
- [1] reply
- Cool Hand Luke
- Yvon Boulianne
- [4] replies
- gesman
- Brett I
- [ 1 ] Thanks
- zapseo
- [ 3 ] Thanks
- Karen Blundell
- [ 2 ] Thanks
- [1] reply
- Yvon Boulianne
- [1] reply
- Brett I
- [ 1 ] Thanks
- [1] reply
- ForumGuru Banned
- [1] reply
- rts2271
- [1] reply
- TimD
- [ 1 ] Thanks
- cabenb
- [ 1 ] Thanks
- baza1955
- [ 1 ] Thanks
- [1] reply
- isharky
- [1] reply
- Alessandro Zamboni
- [1] reply
- tj
- Zlatan Ibra
- [3] replies
- MickK
- [1] reply
- stanton
- MickK
- [1] reply
- Ricardo Furtado
- jex1
- [1] reply
- ForumGuru Banned
- [ 1 ] Thanks
- Paul Myers
- [ 1 ] Thanks
- gloria123
- W Wattles Fan
- cotum
- smith2301
Next Topics on Trending Feed
-
161