Feeds

Tumblr and 4chan knock each other out

Fight! DoS attacks, hacks and erm... kittens fly wildly

Securing Web Applications Made Simple and Scalable

Blogging site Tumblr was knocked offline on Monday by the denizens of 4Chan, which was briefly floored itself during a tit-for-tat dispute that has recently escalated into open hacking attacks by both sides.

Users of 4chan came together to launch a denial of service attack against Tumblr in response to gripes that the site was encroaching on its turf. 4chan is noted as the birthplace of numerous internet memes, such as rickrolling, as well as being a repository for weird smut and the birthplace of the Anonymous attacks against the Church of Scientology and the ongoing campaign against the entertainment industry over its harassment of file-sharers and torrent tracker sites, such as The Pirate Bay.

Tumblr, by contrast, is a far cuddlier online hangout, better known for pictures of kittens than midget pr0n. Nonetheless, 4chan denizens have an apparently long standing dislike of the site. After previously trolling its forums, 4chan members organised a denial of service attack against Tumblr using the same Low Orbit Ion Cannon (LOIC) packet flooding tool previously deployed against the websites of the RIAA, ACS:Law and others.

The attack was scheduled to begin on Sunday and codenamed Operation Overload. In response, Tumblr users launched a counteroffensive - cheekily named Overkitten, involving spamming the notorious /b/ 4chan image board with images of fluffy cats, as well as attempts to otherwise disrupt 4Chan with hacking attacks.

This brave but ultimately perhaps unwise response temporarily took 4chan offline before an even more powerful attack floored Tumblr, which remains unavailable at the time of writing on Monday afternoon. 4chan, by contrast, was only briefly affected.

Techchrunch has more background on the dispute here. ®

Mobile application security vulnerability report

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.