GitHub DDoS Attack Spills Into Day 4

ItEUs day four of the GitHub cyberattack and the digital assault is still evolving as the largest public code repository in the world continues to battle Chinese hackers. GitHub traces the distributed denial of service (DDoS) attack to Friday, calling it the largest in the siteEUs history and one that involves a wide combination of attack vectors.

EUThese include every vector we've seen in previous attacks as well as some sophisticated new techniques that use the Web browsers of unsuspecting, uninvolved people to flood github.com with high levels of traffic,EU GitHub said in a blog post. EUBased on reports we've received, we believe the intent of this attack is to convince us to remove a specific class of content.EU

GitHub has been offering status updates since then, reporting on Sunday that 87 hours into the attack its mitigation was deflecting most of DDoS traffic. Sunday night, all systems were reporting at 100 percent but the attack traffic continued and early Monday morning GitHub said it has EUevolved and we are working to mitigate.EU

Not Just a Grudge

Security experts are reporting the traffic onslaught directed huge amounts of traffic from overseas users of Chinese search giant Baidu to GitHub, according to the Wall Street Journal.

The attackers intentionally targeted GitHub pages that linked to copies of Web sites banned in China, including one page Greatfire.org runs and one Chinese-language version of the New York Times, the Journal reported. Greatfire.org monitors online censorship in China.

We asked Graham Cluley, an independent technology analyst in the United Kingdom, for his take on this attack. He told us what we have here is a highly determined attacker.

EUThis isn't just someone with a grudge operating from their back bedroom. Instead, the people with the most plausible motive are the Chinese government, keen to stamp out access to uncensored content on...

Comments are closed.