Security

CSO

'Error' in Microsoft's DDoS defenses amplified 8-hour Azure outage

A playbook full of strategies and someone fumbles the implementation


Do you have problems configuring Microsoft's Defender? You might not be alone: Microsoft admitted that whatever it's using for its defensive implementation exacerbated yesterday's Azure instability.

No one has blamed the actual product named "Windows Defender," we must note.

According to Microsoft, the initial trigger event for yesterday's outage, which took out great swathes of the web, was a distributed denial-of-service (DDoS) attack. Such attacks are hardly unheard of, and an industry has sprung up around warding them off.

A DDoS attack aims to overwhelm the resources of the targeted system. It usually involves multiple machines infected with malware flooding the victim with network traffic. Admins employ various methods to differentiate real requests from malicious traffic, but according to F5 Labs, there was still an explosive growth in DDoS attacks in 2023.

"Attacks grew so much in fact that, on average, businesses can be expected to deal with a DDoS attack around eleven times a year, almost once a month," the security vendor said.

Microsoft has published its strategy to defend against network-based DDoS attacks, noting it was unique due to the global footprint of the company. Microsoft said it was able to "utilize strategies and techniques that are unavailable to most other organizations" thanks to that footprint, as well as draw from the collective knowledge of an extensive threat network.

"This intelligence, along with information gathered from online services and Microsoft's global customer base, continuously improves Microsoft's DDoS defense system that protects all of Microsoft online services' assets."

This is assuming Microsoft actually implemented that strategy correctly.

For yesterday's event, Microsoft's DDoS protection mechanisms were indeed triggered correctly. However, the response did not go so well. "Initial investigations suggest that an error in the implementation of our defenses amplified the impact of the attack rather than mitigating it," the Windows giant admitted last night.

The problem was global and affected a subset of customers attempting to connect to services, including Azure App Services, Application Insights, Azure IoT Central, Azure Log Search Alerts, Azure Policy, the Azure portal itself, and a subset of Microsoft 365 and Microsoft Purview services.

According to Microsoft the incident lasted from approximately 1145 UTC to 1943 UTC, although the company reckoned the majority of the impact was successfully mitigated by 1410 UTC. The problem wasn't, however, declared over until 2048 UTC.

We contacted Microsoft to learn more about the implementation of its DDoS defenses, but the company has yet to respond. A Preliminary Post Incident Review (PIR) is due in approximately 72 hours, and the company will publish a Final PIR in around two weeks. ®

Send us news
18 Comments

Microsoft turning away AI training workloads – inferencing makes better money

Azure's acceleration continues, but so do costs

Microsoft crafts Rust hypervisor to power Azure workloads

OpenVMM touts stronger security, but not ready for prime time just yet

Microsoft accuses Google of creating a lobbying front called 'Open Cloud Coalition'

Seemingly dissatisfied with CISPE settlement, new UK-centric cloudy industry group calls for end to 'restrictive licensing'

Microsoft's Arm-based Cobalt 100 CPU now live and powering Azure VMs

For general-purpose and memory-optimized workloads

Is Microsoft's AI Copilot? CoPilot? Co-pilot? MVP creates site to help get it right

When you say 'team' do you mean 'Teams' or a SharePoint 'team site'? Letmecorrectthatforyou.com explains the difference

Keir Starmer tells regulators to chill as Microsoft exec takes wheel of advisory council

What could possibly go wrong?

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine

Microsoft accused of 'greenwashing' as AI used in fossil fuel exploration

Activists press Redmond to come clean on ‘material reputational, legal, and operational risks’

Microsoft reshuffles execs in Europe, Middle East and Africa unit

UK CEO becomes EMEA president after taking on role in Brit industrial strategy

Delta officially launches lawyers at $500M CrowdStrike problem

Legal action comes months after alleging negligence by Falcon vendor

Putin's pro-Trump trolls accuse Harris of poaching rhinos

Plus: Iran's IRGC probes election-related websites in swing states

Microsoft says its Copilot AI agents set to tackle employee tasks in November

Let bots manage your supply chain? What could possibly go wrong?