Feeds

Hong Kong beauties stiffed by hackers' enormous poll attack

Miss HK wannabes 'hosed in web flood'

  • alert
  • submit to reddit

High performance access to file storage

Fans of simpering scantily clad vixens are furious after the online voting system to pick the next Miss Hong Kong was demolished by hackers, allegedly. The winner of the much-hyped beauty pageant, held on Sunday, was instead decided by a panel of judges.

Broadcaster TVB had been stringing the public along for months with endless TV adverts and pre-pageant shows as the sizeable pool of Miss Hong Kong wannabes was whittled down. Anticipation reached fever pitch.

Sadly, TVB’s first ever attempt to institute a democratic online system to decide on the winner was overwhelmed by data traffic in what appeared to be a massive denial-of-service attack. This led to the judges choosing Carat Cheung Ming-nga as Hong Kong’s representative at next year’s Miss World bikini-fest.

Microsoft, whose Azure platform was used to power TVB's poll, released a statement claiming that although its cloudy product was not affected, there does appear to have been some foul play:

From the findings of the initial investigation, our engineers identified some unusual data traffic targeting the TVB fun application in the operating records of the related voting system. Within the 15-minute voting period, the system already recorded unusual data traffic which was many times higher than the original expectation. This was substantially higher than the total number of people watching the program and also the total population of Hong Kong.

We therefore have grounds to suspect that the application was attacked by malicious hackers, causing abnormal disruption in the operation of the application and thus the subsequent uploading of related data to the cloud system for further processing.

The statement added that personal information stored in the system was not affected by the attack, and that TVB has appointed a third party to investigate further.

The HK Standard suggests Hong Kongers are furious at the judges’ final decision – a certain Tracy Chu Chin-suet was the hot favourite, apparently – and that punters had missed out on the chance to win a Mini Cooper.

You wouldn’t see this sort of thing happening during Strictly. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.