theGhost
Good Job sammie!

Or... I was working on this all day and...

I simply changed my name servers to a landing page...in this case a godaddy landing page. Waited 15 minutes and reset the name servers back to my own. Stop the attack cold. I broke the attack in mid stream and hasn't returned. Yea for me...That was annoying.

I simply removed my url as a potential attacking site probally from their master attack script. The attack only affects BoonEx hosted sites as many other sites on this particular see more server were unaffected.

Someone definately doesn't like Dolphin :( All of course monitor the situation over the next 48 hours to ensure no return. But for everyone else...Trying this will NOT affect your site and requires no script modifications for those who would rather not script write. Basically just hides your Dolphin in the Global Net for a few moments :)
DoLaugh
Can you give more information on the godaddy landing page? I might want to try that.
theGhost
If you register Domains with GoDaddy or anyother Registrar then you have control on Parked, Hosted or Custom name servers. Since I use GD as a Registrar but not a host I always am setting custom name servers. So this attack just allowed me to switch the NS to Parked for a few minutes. Stop it. But then a single check after this post and at 1am a restart this time with a fix in the attack which tells me alot about the attackers and their methods of exploit.

So it was a Temp Fix at best...But damn see more if I didn't try to find an easy Turn Off button :)
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.
PET:0.045704126358032