Feeds

Auction for failed games developer hit by DDoS attack

Everything must go...

Using blade systems to cut costs and sharpen efficiencies

Realtime Worlds' liquidation auction was blitzed off the web on Friday, following an attack on the website of auctioneers Sweeney Kincaid.

The online auction of kit from the failed games developer was first postponed by four hours, but after more denial of service attacks, it was eventually moved offline. The auctioneers, Sweeney Kincaid, responded to the continual attacks on its website by inviting final tenders via email. The deadline for closing bids fell on Sunday.

The sale of more than 1,000 items of office equipment and PCs eventually raised more than £100K, according to a spokesman for Sweeney Kincaid.

Realtime Worlds employed 200 workers in Dundee and the US prior to its demise in September 2010. Delays in the release of a multi-player game called APB (All Points Bulletin) and indifferent early reviews when it finally arrived in June were among the most significant contributors to the failure of the video games developer, the largest employer of its type in Scotland.

Our man at the auctioneer confirmed that the offline final tender process was applied to complete the sale in response to denial of service attacks. Although reluctant to be drawn on his suspicions, he said the attack might be the work of "disgruntled creditors with a gripe against Realtime Worlds" rather than a grievance with the auctioneer.

"This is the first time this has happened in two-and-a-half years of running auctions online," he told El Reg "We monitor loads and handle far bigger auctions than this. Online rumours that our site couldn't cope are simply untrue."

Defending against denial of service attacks is a notoriously tricky business, best tackled by mitigation tools at ISP premises to block attack traffic that would normally flood a targeted website. Sweeney Kincaid staff came into work on Sunday to complete the auction. Our contact at the Glasgow-based auctioneers said it was already applying unspecified defences to guard against a repetition of the site-availability problems it experienced on Friday as a result of the attack.

The auctioneer has apologised to prospective bidders via an email, copies of which were forwarded to El Reg.

"Due to continued attacks on our web servers, we have no option but to suspend live auction bidding on this sale due to many of you experiencing service outages," Sweeney Kincaid explained.

"The bids currently showing online and made to date will still stand, however further bidding on all lots in this sale will now be invited offline, by email."

Sweeney Kincaid is considering its options about whether or not to bring in the police to investigate the attack. "We are looking at options and talking to our lawyers. We've not ruled anything out," a spokesman said. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.