Feeds

Election poll shot down by DDoS-ers

Civic referendum hit by MILLION clicks-per-second anti-democracy types

Securing Web Applications Made Simple and Scalable

Two local men have been arrested after an online referendum organised by Hong Kong university to poll citizens on their choice of chief executive was disabled in an apparent denial of service attack.

Broadcaster Radio Television Hong Kong (RTHK) reported that the men, aged 17 and 28, were arrested at the weekend after the online poll was disrupted for a large part of Friday and some of Saturday.

Hong Kong university’s Public Opinion Program set up the 'Civic Referendum Project' because people who live in the Special Administrative Region (SAR) of China are not given the power to vote directly for their CEO – effectively the head of the Hong Kong government.

Instead a pre-selected 1,200-strong Election Committee full of pro-Beijing businessmen is given the task, a fact that is angering a growing number of democracy-hungry locals, especially given that this year’s candidates were universally unpopular and tainted with scandal.

AFP reported that Hong Kong uni’s back-end systems buckled under the huge volume of traffic.

The system has been very busy," Robert Chung, director of the university's program, apparently told reporters. "We suspect it is under systematic attack as there are more than one million clicks on our system every second."

Chung was reportedly reticent about the potential motive for the attack but it is well known that the Chinese authorities are not a massive fan of free speech and probably viewed the referendum as undermining the result of the real vote - the outcome of which Beijing basically controls.

In any case it has always been nigh on impossible to directly link the Chinese government with specific cyber attacks, although it is widely suspected that it allows so-called patriotic hackers and even more obvious cyber criminals to commit offences as long as they are in the national interest.

A report by US defence contractor Northropp Grumman earlier this month alleged that China’s military relies on academia and the commercial IT sector to boost its R&D efforts in information warfare.

In the end only around 220,000 Hong Kong-ers were able to take part in the poll out of a population of seven million, with a majority of over 50 per cent spoiling their papers to signify that they supported ‘none of the above’ candidates.

Votes could be cast online, via SMS or a smartphone app, as well as in several polling stations in the region. ®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you on YouPorn lately, perhaps? White House website?
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.