The denial of service attack that crippled servers across the U.S. East Coast on Friday was the result of a "sophisticated, highly distributed" assault that involved millions of Internet addresses and a malicious software, according to Dyn.
The Internet traffic company released a blog post in which it gave preliminary findings on the attack, adding that it was still conducting a thorough investigation.
It confirmed that "one source of the traffic for the attacks were devices infected by the Mirai botnet," disruptive software deployed most recently against Krebs on Security and foreign intelligence services, according to Flashpoint.
In addition, "we observed [tens] of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack," Dyn wrote.
The attack comes amid heightened cybersecurity fears and a rising number of Internet security breaches. Preliminary indications suggest that countless Internet of Things (IoT) devices that power everyday technology like closed-circuit cameras and smart-home devices were hijacked by the malware, and used against the servers.
"Mirai scours the Web for IoT devices protected by little more than factory-default usernames and passwords, and then enlists the devices in attacks that hurl junk traffic at an online target until it can no longer accommodate legitimate visitors or users," Krebs explained in a post on Friday.
Dyn plays a critical role in the Web's infrastructure, essentially serving as the Internet's version of the Yellow Pages. When its architecture was attacked, it took down a host of major sites, including Twitter, Tumblr and Amazon.com.