TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A DDoS in Asia Pacific

89 pointsby boutcheralmost 10 years ago

8 comments

irvinflyalmost 10 years ago
China is doing a mass arrestment*1 of 100+ human right lawyers last weekend, in the same times as DDoS start and end, and there&#x27;s a news from China&#x27;s official news agent indicate that Telegram is the main secret contacting tool that human right lawyers used.<p>Some people think it&#x27;s China who attack Telegram, to avoid the lawyers to warning each other for the arrestment.<p>1) <a href="https:&#x2F;&#x2F;www.facebook.com&#x2F;chrlcg&#x2F;photos&#x2F;a.1571958406350448.1073741828.1571955643017391&#x2F;1634700570076231&#x2F;?type=1" rel="nofollow">https:&#x2F;&#x2F;www.facebook.com&#x2F;chrlcg&#x2F;photos&#x2F;a.1571958406350448.10...</a><p>2) <a href="http:&#x2F;&#x2F;news.xinhuanet.com&#x2F;politics&#x2F;2015-07&#x2F;11&#x2F;c_128010249.htm" rel="nofollow">http:&#x2F;&#x2F;news.xinhuanet.com&#x2F;politics&#x2F;2015-07&#x2F;11&#x2F;c_128010249.ht...</a>
评论 #9877619 未加载
kijinalmost 10 years ago
According to the founder [1], Telegram was even removed from Play Store for a few hours at the request of a South Korean competitor.<p>For whatever reason, somebody in South Korea is seriously pissed off with Telegram.<p>[1] <a href="https:&#x2F;&#x2F;twitter.com&#x2F;durov&#x2F;status&#x2F;619486763032182784" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;durov&#x2F;status&#x2F;619486763032182784</a>
评论 #9876358 未加载
评论 #9878447 未加载
评论 #9878758 未加载
评论 #9876992 未加载
mahranchalmost 10 years ago
I <i>knew</i> it would be S.Korea. The company I used to work for, at the time I left, was dealing with some particularly spiteful individuals from S.Korea who have been DDoSing their gaming platform and their separate video host. This was happening off and on for about 12 months. Interestingly enough, each attack was committed by completely different individual and were unrelated. In one attack where the guy was caught (I think they caught all but 2 of the attackers), he claimed he ran the DDoS because he didn&#x27;t like the fact that there was a Japanese pop music video being hosted on the video site. This wasn&#x27;t a young kid either, the guy was 33 and had a full time job at some advertising company.
评论 #9876301 未加载
评论 #9876325 未加载
评论 #9876326 未加载
dbrannanalmost 10 years ago
I got hit by two of these (1&#x2F;27 to Feb 4th and 6&#x2F;4 to 6&#x2F;22), and they were relentless. It was difficult to know where the attack originated because many proxies were involved - most inside the USA). We only managed a 62% uptime during the whole affair, many customers were upset, and it really hurt business. We ended up refunding everyone for the month and sending out a huge apology, for which many customers were understanding. Still, it hurt our business dramatically.
linhatalmost 10 years ago
This is most interesting...<p><pre><code> The garbage traffic came from about a hundred thousand infected servers, most noticeably, in LeaseWeb B.V., Hetzner Online AG, PlusServer AG, NFOrce Entertainment BV, Amazon and Comcast networks. That said, the attack was distributed evenly across thousands of hosts and none contributed more than 5% of the total volume. </code></pre> I used to host a lot with Hetzner, and while quite expensive, they mostly responded to these kinds of things very quickly and with a certain level of technical competence (which definitely cannot be said of every hoster). Also, I&#x27;m quite surprised to not see OVH in there, as their network has a kind of &quot;reputation&quot; for these things...<p><pre><code> Fighting back would‘ve been a little easier, if the abuse departments in most of the mentioned companies didn’t process requests 9-5, Mon-Fri only. (Hours more befitting a scuba-diving shop in Vatican.) </code></pre> Business as usual I would say...although I don&#x27;t scuba-dive...<p>Edit: formatting
评论 #9878163 未加载
asdfaoeualmost 10 years ago
200Gbps (if true) seems very high for a non reflection attack.
评论 #9876629 未加载
评论 #9879469 未加载
评论 #9876138 未加载
isedalmost 10 years ago
Question: Is this possible because they are using Linux servers? The Linux kernel adopted TCP Fast Open?<p><a href="https:&#x2F;&#x2F;www.ietf.org&#x2F;mail-archive&#x2F;web&#x2F;tcpm&#x2F;current&#x2F;msg08204.html" rel="nofollow">https:&#x2F;&#x2F;www.ietf.org&#x2F;mail-archive&#x2F;web&#x2F;tcpm&#x2F;current&#x2F;msg08204....</a>
评论 #9879361 未加载
cpncrunchalmost 10 years ago
Simple solution: move to OVH. Although they don&#x27;t have servers in SE Asia, perhaps 100% uptime is more important than shaving 100ms off the ping time. (As far as I can tell they don&#x27;t have real-time audio or video anyway).
评论 #9878639 未加载
评论 #9879047 未加载