Feeds

Amazon blames hardware – not hackers – for European outage

Anonymous denies Grinch-style attack on Xmas shoppers

Top 5 reasons to deploy VMware with Tegile

Problems with Amazon's systems in Europe over the weekend were down to hardware failure rather than hackers, the e-commerce giant said on Sunday.

Christmas shoppers trying to complete purchases from Amazon's online stores in the UK, France, Germany, Austria and Italy were locked out for around half an hour on Sunday. Amazon famously withdrew services from whistle-blower website Wikileaks at the start of the month, a move that potentially made it a target for attacks from Anonymous.

However, Amazon said the temporary outage was caused by "hardware failure" at a Dublin-based hosting facility that serves the sites. Web services monitoring firm Netcraft confirmed this diagnosis, adding that the affected sites were affected by around half an hour of downtime at around 21.15 GMT on Sunday.

A statement from Anonymous denied launching an attack against Amazon, arguing that such a move would be counterproductive, in PR terms, as well as difficult in practice. Amazon's distributed system makes it more resilient against distributed denial of service attacks, if not hardware failure.

"While it is indeed possible that Anonymous may not have been able to take Amazon.com down in a DDoS attack, this is not the only reason the attack never occurred," the group said, the BBC reports.

"After the attack was so advertised in the media, we felt that it would affect people such as consumers in a negative way and make them feel threatened by Anonymous.

"Simply put, attacking a major online retailer when people are buying presents for their loved ones would be in bad taste," it added.

Anonymous launched a denial of service attack against Amazon last week in retaliation for terminating WikiLeaks' web-hosting services, but the assault failed. Instead of launching a follow-up attack on Amazon over the weekend, activists from the Anonymous collective were concentrating on a second wave of attacks against Mastercard.

In a statement on its Mastercard.com website, the credit card giant acknowledged the attack on its website, but denied any suggestion that this would have an impact on credit card transaction processing. "MasterCard has made significant progress in restoring full-service to its corporate website," said the multinational. "Our core processing capabilities have not been compromised and cardholder account data has not been placed at risk. While we have seen limited interruption in some web-based services, cardholders can continue to use their cards for secure transactions globally."

Anonymous' Operation:Payback Campaign has targeted the websites of firms which severed commercial ties with Wikileaks over the last week. The withdrawal of payment services to the whistle-blower website spawned attacks against Paypal and Visa as well as Mastercard. The Swedish Prosecutor's website was also hit by Anonymous over its decision to issue a European arrest warrant for Wikileaks founder Julian Assange in relation to sexual assault allegations. Assange denies the charges. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.