DYN DNS update: Key Findings:
The Friday October 21, 2016 attack has been analyzed as a complex & sophisticated attack, using maliciously targeted, masked TCP and UDP traffic over port 53.
Dyn confirms Mirai botnet as primary source of malicious attack traffic.
Attack generated compounding recursive DNS retry traffic, further exacerbating its impact.