Security

CSO

'Error' in Microsoft's DDoS defenses amplified 8-hour Azure outage

A playbook full of strategies and someone fumbles the implementation


Do you have problems configuring Microsoft's Defender? You might not be alone: Microsoft admitted that whatever it's using for its defensive implementation exacerbated yesterday's Azure instability.

No one has blamed the actual product named "Windows Defender," we must note.

According to Microsoft, the initial trigger event for yesterday's outage, which took out great swathes of the web, was a distributed denial-of-service (DDoS) attack. Such attacks are hardly unheard of, and an industry has sprung up around warding them off.

A DDoS attack aims to overwhelm the resources of the targeted system. It usually involves multiple machines infected with malware flooding the victim with network traffic. Admins employ various methods to differentiate real requests from malicious traffic, but according to F5 Labs, there was still an explosive growth in DDoS attacks in 2023.

"Attacks grew so much in fact that, on average, businesses can be expected to deal with a DDoS attack around eleven times a year, almost once a month," the security vendor said.

Microsoft has published its strategy to defend against network-based DDoS attacks, noting it was unique due to the global footprint of the company. Microsoft said it was able to "utilize strategies and techniques that are unavailable to most other organizations" thanks to that footprint, as well as draw from the collective knowledge of an extensive threat network.

"This intelligence, along with information gathered from online services and Microsoft's global customer base, continuously improves Microsoft's DDoS defense system that protects all of Microsoft online services' assets."

This is assuming Microsoft actually implemented that strategy correctly.

For yesterday's event, Microsoft's DDoS protection mechanisms were indeed triggered correctly. However, the response did not go so well. "Initial investigations suggest that an error in the implementation of our defenses amplified the impact of the attack rather than mitigating it," the Windows giant admitted last night.

The problem was global and affected a subset of customers attempting to connect to services, including Azure App Services, Application Insights, Azure IoT Central, Azure Log Search Alerts, Azure Policy, the Azure portal itself, and a subset of Microsoft 365 and Microsoft Purview services.

According to Microsoft the incident lasted from approximately 1145 UTC to 1943 UTC, although the company reckoned the majority of the impact was successfully mitigated by 1410 UTC. The problem wasn't, however, declared over until 2048 UTC.

We contacted Microsoft to learn more about the implementation of its DDoS defenses, but the company has yet to respond. A Preliminary Post Incident Review (PIR) is due in approximately 72 hours, and the company will publish a Final PIR in around two weeks. ®

Send us news
18 Comments

Microsoft investigating 365 Office activation gremlin

Says it's not sure what the issue is but points at admins tweaking licensing options

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Microsoft Edge takes a victory lap with some high-looking usage stats for 2024

Lots of big numbers, but market share wasn't one of them

Microsoft coughs up yet more Windows 11 24H2 headaches

Users report the sound of silence from operating system update

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

When old Microsoft codenames crop up in curious places

Chicago is my kind of driver model

AI's rising tide lifts all chips as AMD Instinct, cloudy silicon vie for a slice of Nvidia's pie

Analyst estimates show growing apetite for alternative infrastructure

Suggested Actions fails to suggest its own survival as Windows 11 feature killed

Final curtain call for weird wingman

The winner of last year's Windows Ugly Sweater is ...

Register readers have spoken

Technical issue briefly grounds American Airlines flights across US

Unspecified "vendor technology" to blame for hour-long stop order

Windows 11 24H2 strikes again – Outlook might not start with Google Workspace Sync running

Meanwhile, 365 Enterprise users have a date for new Outlook rollout

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains