UPDATE - 02/21/2018 2:45PM GMT
As a follow up to the DDoS attack experienced yesterday, we are reporting that all Distil systems remain fully functioning. We also want to validate the timeline referenced in our previous update and provide some additional data on the volumetric DDoS attack against our Global Cloud network. The attack began at 9:17 pm GMT and saw a steady increase in the volume of packets per second targeting the East Coast of the United States; reaching as much as a 2500% increase in normalized traffic levels. At 9:43 pm GMT, additional countermeasures began to take effect that fully thwarted the malicious traffic by 10:03 pm GMT. We have ongoing analysis with our security team, our upstream providers and our DDoS mitigation provider to fully understand the attack vector and to implement new mitigation actions that can take effect more quickly.
If you have any questions, please don't hesitate to contact us at firstname.lastname@example.org.
UPDATE - 02/20/2018 11:15PM GMT
At approximately 10:03PM GMT, Distil's NOC team noticed traffic returning to normalized levels. We're currently completing a series of checks to validate all aspects of the service have been fully restored.
If you are continuing to route your traffic through Distil, then we recommend bypassing for the next 30 minutes. If you would like to stay on, please be sure to monitor your site closely for any reports of errors. However, we believe all sites should be working as expected.
UPDATE - 02/20/2018 10:25PM GMT
Distil is currently verifying the resolution. We will post an update once it is fully resolved.
UPDATE - 02/20/2018 9:45PM GMT
Distil is currently being targeted by a DDoS attack. We are actively working on a solution and will post an update when we have more information.