Feeds

Chernobyl coverage blows up in Radio Free Europe's face

DDOS bomb

Next gen security for virtualised datacentres

Websites run by Radio Free Europe have been under a fierce cyber attack that coincided with coverage over the weekend of a rally organized by opposition to the Belarusian opposition.

The distributed denial of service (DDoS) attack initially targeted only the RFE's Belarus service, which starting on Saturday was inundated with as many as 50,000 fake pings every second, according the this RFE account. On Monday, it continued to be affected. At least seven other RFE sites for Kosovo, Azerbaijan, Tatar-Bashkir, Farda, South Slavic, Russia and Tajikistan, were also attacked but have mostly been brought back online.

The primary target was the Belarus service, which on Saturday - the 22nd anniversary of the Chernobyl nuclear disaster - offered live coverage of a rally in which thousands of people protested the plight of uncompensated victims and a government decision to build a new nuclear plant. Other Belarusian websites were also hit, including the Minsk-based nongovernmental organization Charter 97.

RFE provided no solid evidence, but said the Belarusian government was most likely behind the attacks. The Belarusians "see free information - flowing information of ideas and so forth - as the oxygen of civil society," RFE President Jeffrey Gedmin said. "They'll do anything they can to cut it off. If it means jamming, if it means cyber attacks, that's what they'll do."

While a state-sponsored attack isn't outside the realm of possibility, there was no mention that it might be the grassroots work of Belarusian nationalists. Recent attacks against CNN.com, were the work of Chinese hacktivists who downloaded and installed DDoS applications as a way of registering their displeasure of the news site's recent coverage of demonstrations against the Olympic torch relay.

"Utilizing the bandwidth of the over 200 million nationalism minded Chinese Internet users can greatly outpace any botnet's capacity if coordinated," researcher Dancho Danchev wrote. To that end, he said, Chinese script kiddies circulated programs such as anticnn.exe and Super DDoS.

Attacks such as these were also waged last year against Estonia and are sometimes referred to as "asymmetric" because a relatively small group of individuals with modest means is able to hobble much a bigger target. It's not hard to imagine that something similar is afoot in Belarus.

Regardless of who is behind the attacks, the result is same, and that is the protest coverage is being disrupted.

"For our listeners in Belarus, it's quite dramatic, spokeswoman Diane Zeleny told the Associated Press. "They cannot reach us right now. This is a pretty massive attack." ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.