Feeds

Hong Kong beauties stiffed by hackers' enormous poll attack

Miss HK wannabes 'hosed in web flood'

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Fans of simpering scantily clad vixens are furious after the online voting system to pick the next Miss Hong Kong was demolished by hackers, allegedly. The winner of the much-hyped beauty pageant, held on Sunday, was instead decided by a panel of judges.

Broadcaster TVB had been stringing the public along for months with endless TV adverts and pre-pageant shows as the sizeable pool of Miss Hong Kong wannabes was whittled down. Anticipation reached fever pitch.

Sadly, TVB’s first ever attempt to institute a democratic online system to decide on the winner was overwhelmed by data traffic in what appeared to be a massive denial-of-service attack. This led to the judges choosing Carat Cheung Ming-nga as Hong Kong’s representative at next year’s Miss World bikini-fest.

Microsoft, whose Azure platform was used to power TVB's poll, released a statement claiming that although its cloudy product was not affected, there does appear to have been some foul play:

From the findings of the initial investigation, our engineers identified some unusual data traffic targeting the TVB fun application in the operating records of the related voting system. Within the 15-minute voting period, the system already recorded unusual data traffic which was many times higher than the original expectation. This was substantially higher than the total number of people watching the program and also the total population of Hong Kong.

We therefore have grounds to suspect that the application was attacked by malicious hackers, causing abnormal disruption in the operation of the application and thus the subsequent uploading of related data to the cloud system for further processing.

The statement added that personal information stored in the system was not affected by the attack, and that TVB has appointed a third party to investigate further.

The HK Standard suggests Hong Kongers are furious at the judges’ final decision – a certain Tracy Chu Chin-suet was the hot favourite, apparently – and that punters had missed out on the chance to win a Mini Cooper.

You wouldn’t see this sort of thing happening during Strictly. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Symantec backs out of Backup Exec: Plans to can appliance in Jan
Will still provide support to existing customers
VMware's tool to harden virtual networks: a spreadsheet
NSX security guide lands in intriguing format
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.