It is possible to use powerful systems, such as cloud services, to launch DDoS attacks. They typically amplify the attack with some interesting tricks. But launching them from a handful of sources makes it easier to filter out than compared to a wide dispersion of sources. Additionally, once the vendor is notified, they will move quickly to shut it down and then try and figure out who funded the attack (purchased the compute power).
You are viewing a single comment's thread from: