Disclaimers on Views/Information Contained in this Blog

Follow the link to my Homepage.


Disclaimers on Views/Information Contained in thie Blog

- The opinions expressed on this blog are those of the author's (or the author(s) of the original articles), and do not reflect, in any shape, way, or form, the official policy or position of the author's employer (current or former) or any other organization.

- Information contained on this blog is entirely derived from unclassified open source information, and is based exclusively on the content and behavior of selected media.

- Please note that some of the postings will provide only information with no comments or analysis while other postings will have comments and/or analysis.

Tuesday, June 15, 2010

A South Korean Computer Security Firm expects Another Round of DDoS Attacks Today

(From Financial News in Korean; By Hong Suk-Hui; Translation by 'Straight and Stalwart')
Possible China-Originated DDoS Attack on June 16 Detected(Click here for the original Korean reporting)


Following the two recent Distributed Denial of Service (DDoS) attacks that originated from China, it has been detected that there will be another round of DDoS attack on the 16th.

ESTsoft, a computer security firm, stated on the 14th that it has detected some movements for a third DDoS attack to commence on the 16th. The upcoming DDoS attack is being planned by the same group of Chinese netizens that twice earlier attempted DDoS attacks on the South Korean government portal sites, some governmental agencies sites, and sites related to a boy band Super Junior, ESTsoft added.

ESTsoft does not expect the upcoming DDoS attack to have a large-scale damage; however, because the number of IP that was used in the recent DDoS attack is on the rise, it warrants caution.

What sets the upcoming DDoS, which is being called "the Holy War" among the Chinese netizens, apart from other typical DDoS is that this DDoS is being conducted manually - the organizers of the attack are actively recruiting for participants and distributing specific software designed to attack a designated website.

ESTsoft said, "The first and second attacks, which occurred on the 9th and the 11th, respectively, were not very effective, and the third attack will most likely be similar in form to previous attacks." "The number of IP used in the second attack was over double of that used during the first attack; therefore, it needs to be watched closely," it added.

No comments:

Post a Comment