crime

Mt Gox faced 150,000 attacks per second, media report

8 Comments

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© 2014 AFP

©2019 GPlusMedia Inc.

8 Comments
Login to comment

so they had 750,000 bitcoins in their highly secured HDD and hacker cut&pasted them somewhere else. They should have backup since everything is digital(sarcasm).

-1 ( +1 / -2 )

If my computer got 150,000 attacks per second, my natural reaction would be to pull out the cable,,,

3 ( +6 / -3 )

Same thought. During such a massive attack, why not just go off-line. Pull the plug for awhile.

0 ( +2 / -2 )

Ironic how china and Russia both get a mention, but not in relation to the DOS attack, me thinks they both will have more to do with this story than restricting how bitcoin can be used.

2 ( +2 / -0 )

Why isn't this news story about the fact their source code was published to the internet last Friday.

0 ( +3 / -3 )

gogogo,

As was huge portions of their customer database. Major media doesn't report on dox dumps to pastebins, but it will all surface eventually.

2 ( +3 / -1 )

While Mt Gox faced hacker attempts to steal bitcoins, the exchange also confronted massive DDoS attacks, crippling its systems, the newspaper said without naming its sources.

Just a small point of clarification here, but the DDoS attacks and the hacking attempts are one and the same thing, not two separate things. The oldest variation of this tactic dates back to Unix and was known as "smurfing". The system would overload and reboot, and during reboot software loads up in a preset order, BIOS first, then OS, then other software such as virus protection, etc. In simple terms this means that if you can force a reboot then the system is momentarily defenseless, but moments are all you need to insert some code that allows you to create a back door into the system.

What stuns me is that any half-way competent systems administrator would have are equipped a high-value target like this with flood protection that would identify the addresses that attacks were coming from and automatically reject any traffic from these sources. This is not a new trick, and only a complete newbie system administrator would be caught off guard by it. Also, most system administrators I know carry smartphones with them everywhere and can shut down the system remotely the moment they detect any unusual traffic that might indicate a hack in progress, and then rush into the office to reboot the system in off-line mode and repair any damage or restore from the latest set of back-ups.

Who was running this system?

1 ( +4 / -3 )

Same thought. During such a massive attack, why not just go off-line. Pull the plug for awhile.

This wouldn't really accomplish anything. Once the 'plug' was 'reinserted', the attacks would continue. All it would serve to do would be to take the site offline for legitimate users.

As Frungy says, rejecting traffic from the attackers is the way to go.

0 ( +1 / -1 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites