Tuesday, September 26, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • 3 Key Telltales That Unmask the Reach of SMS Fraud
  • Daniel Stori's ‘Forked’
  • ‘All of Sony’ Hacked, Claims Ransomed.vc Group
  • A Day In the Life with Product Designer, Vivian Lee
  • FedRAMP Rev. 5: Everything You Need to Know to Transition
Data Security Security Bloggers Network 

Home » Cybersecurity » Data Security » DDoS attack that knocked Telegram secure messaging service offline linked to Hong Kong protests

SBN

DDoS attack that knocked Telegram secure messaging service offline linked to Hong Kong protests

by Graham Cluley on June 13, 2019

An attack which targeted users of the Telegram app on Wednesday might be linked to protests in Hong Kong that turned violent.

AWS Builder Community Hub

That’s one of the theories in circulation, after a distributed denial-of-service (DDoS) attack disrupted legitimate access to the Telegram secure messaging app by swamping it with “garbage requests.”

Pitched battles broke out in Hong Kong on Wednesday between police and protestors over proposals to allow the extradition of suspects to mainland China.

Smartphone messaging apps like Telegram and the less well-known FireChat – which creates a mesh network using Bluetooth and peer-to-peer Wi-Fi, allowing users to communicate even when they don’t have a cellular signal or internet access – are currently amongst the most popular downloads in Hong Kong’s iOS app store and were being widely used by protesters.

Many of those involved in the demonstrations, fearful of potential repercussions if facial recognition technology was deployed by law enforcement, covered their faces with masks and queued to buy public transport tickets rather than using Oyster cards that might be tracked.

Verna Yu confirms that people at train/metro stations in Hong Kong are buying paper tickets because they fear police will track them through their Octopus Card and know they were at the protest. Huge queues for tickets. pic.twitter.com/SRZOH4tRaP

— Kate Lyons (@MsKateLyons) June 12, 2019

Clearly any disruption of encrypted messaging apps being used by protesters would be massively inconvenient.

In a series of tweets, Telegram described that it was under attack and offered one of the most humorous descriptions of a denial-of-service attack that I’ve ever heard:

We’re currently experiencing a powerful DDoS attack, Telegram users in the Americas and some users from other countries may experience connection issues.

A DDoS is a “Distributed Denial of Service attack”: your servers get GADZILLIONS of (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Graham Cluley. Read the original post at: https://www.tripwire.com/state-of-security/featured/ddos-attack-telegram-offline-hong-kong-protests/

June 13, 2019June 13, 2019 Graham Cluley DDoS attack, Featured Articles, IT Security and Data Protection, messaging, Telegram
  • ← Aircraft Parts Manufacturer Halts Operations After Ransomware Attack
  • The Road to reInforce – Predictions with Our CMO →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Thu 28

A Guide to Smart Dependency Management

September 28 @ 12:00 pm - 1:00 pm
Oct 03

Way Too Vulnerable: Uncovering the State of the Identity Attack Surface

October 3 @ 11:00 am - 12:00 pm
Oct 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Oct 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Oct 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Oct 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm
Oct 19

Managing Security Posture and Entitlements in the Cloud

October 19 @ 1:00 pm - 2:00 pm
Oct 24

When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig

October 24 @ 11:00 am - 12:00 pm
Oct 24

Reporting From the Pipeline: The State of Software Security in DevOps

October 24 @ 1:00 pm - 2:00 pm
Oct 30

Zero-Trust

October 30 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator
China Accuses US of Years of Cyber-Spying, Malware Campaigns
Signal Intros Quantum-Resistant Encryption for App
Data Security Posture Management: What’s Fact and What’s Fiction?
Don’t Ignore Data Sovereignty
Helpdesk Telephone Attack: How to Close Process and Technology Gaps
Improve Your Organization’s Cloud Infrastructure with PeoplActive’s Cloud Consulting Services
Email Intelligence Dashboard
A Guide to Understanding the Three CMMC Levels
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator
Analytics & Intelligence API Security Application Security AppSec Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Insider Threats Malware Mobile Security Most Read This Week Network Security News Popular Post Regulatory Compliance Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator

September 25, 2023 Richi Jennings | Yesterday 0
Google: Chromebooks Will Get 10 Years of Software, Security Updates
Application Security Cybersecurity Data Security Endpoint Featured Industry Spotlight Malware Mobile Security Network Security News Security Boulevard (Original) Spotlight 

Google: Chromebooks Will Get 10 Years of Software, Security Updates

September 19, 2023 Jeffrey Burt | Sep 19 0
Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware
Cloud Security Cybersecurity Data Security Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threats & Breaches 

Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware

September 18, 2023 Jeffrey Burt | Sep 18 0

Top Stories

‘All of Sony’ Hacked, Claims Ransomed.vc Group
Analytics & Intelligence Application Security AppSec Blockchain CISO Conversations CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics DevSecOps Digital Currency Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Malware Most Read This Week Network Security News Popular Post Ransomware Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

‘All of Sony’ Hacked, Claims Ransomed.vc Group

September 26, 2023 Richi Jennings | 3 hours ago 0
Data Breaches from MOVEit Zero-Day Still Piling Up
Cybersecurity Data Security Featured Incident Response Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Data Breaches from MOVEit Zero-Day Still Piling Up

September 25, 2023 Jeffrey Burt | Yesterday 0
Qakbot Takedown Resembles Hack Back, Will Botnet, Malware Be Resurrected?
Analytics & Intelligence Application Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Malware News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Qakbot Takedown Resembles Hack Back, Will Botnet, Malware Be Resurrected?

September 25, 2023 Teri Robinson | Yesterday 0

Security Humor

Daniel Stori's ‘Forked’

Daniel Stori’s ‘Forked’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.