Feeds

Hong Kong beauties stiffed by hackers' enormous poll attack

Miss HK wannabes 'hosed in web flood'

  • alert
  • submit to reddit

7 Elements of Radically Simple OS Migration

Fans of simpering scantily clad vixens are furious after the online voting system to pick the next Miss Hong Kong was demolished by hackers, allegedly. The winner of the much-hyped beauty pageant, held on Sunday, was instead decided by a panel of judges.

Broadcaster TVB had been stringing the public along for months with endless TV adverts and pre-pageant shows as the sizeable pool of Miss Hong Kong wannabes was whittled down. Anticipation reached fever pitch.

Sadly, TVB’s first ever attempt to institute a democratic online system to decide on the winner was overwhelmed by data traffic in what appeared to be a massive denial-of-service attack. This led to the judges choosing Carat Cheung Ming-nga as Hong Kong’s representative at next year’s Miss World bikini-fest.

Microsoft, whose Azure platform was used to power TVB's poll, released a statement claiming that although its cloudy product was not affected, there does appear to have been some foul play:

From the findings of the initial investigation, our engineers identified some unusual data traffic targeting the TVB fun application in the operating records of the related voting system. Within the 15-minute voting period, the system already recorded unusual data traffic which was many times higher than the original expectation. This was substantially higher than the total number of people watching the program and also the total population of Hong Kong.

We therefore have grounds to suspect that the application was attacked by malicious hackers, causing abnormal disruption in the operation of the application and thus the subsequent uploading of related data to the cloud system for further processing.

The statement added that personal information stored in the system was not affected by the attack, and that TVB has appointed a third party to investigate further.

The HK Standard suggests Hong Kongers are furious at the judges’ final decision – a certain Tracy Chu Chin-suet was the hot favourite, apparently – and that punters had missed out on the chance to win a Mini Cooper.

You wouldn’t see this sort of thing happening during Strictly. ®

Best practices for enterprise data

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?