Feeds

EVE Online OFFLINE: Wannabe Capt Kirks clobbered in cluster-ruck

Server plugs pulled as aliens sink nerds' battleships

Beginner's guide to SSL certificates

Updated Multiplayer spaceship game EVE Online has taken its systems offline after it was warped out of shape by a debilitating denial-of-service attack.

In a statement on Facebook, its developers at CCP Games explained that it disconnected its server cluster from the internet as a precaution while it reviewed the integrity and defences of its infrastructure:

At 02:05 GMT June 2nd, CCP became aware of a significant and sustained distributed denial-of-service attack (DDoS) against the Tranquility cluster (which houses EVE Online and DUST 514) and web servers.

Our policy in such cases is to mobilize a taskforce of internal and external experts to evaluate the situation. At 03:07 GMT, that group concluded that our best course of action was to go completely offline while we put in place mitigation plans.

While we initially reopened EVE Online and DUST 514, we have since re-evaluated. With the highest sense of precaution we have taken Tranquility and associated websites back down for further investigation and an exhaustive scan of our entire infrastructure. We will update you more frequently via our Twitter feed (www.twitter.com/eveonline), however, an extended service interruption of several hours is expected as this process should not be rushed.

Role-playing game EVE Online, once memorably described by a player as having “the learning curve of putting a 5-year-old through a nuclear physics masters degree” has, over recent years, become a forum where rival gamers, gold farmers and occasionally hacktivists such as LulzSec slug it out.

In some ways the real-world action is much colourful than the space-cruiser-on-battleship action that the game actually offers, but it's rare for systems to be taken offline. Progress towards resolving the problem can be found on Eve Online's Twitter feed here. ®

Updated to add

Eve Online's Tranquility server cluster is now coming back online. The team said it discovered someone exploiting a vulnerability in its backend systems, and has patched the bug.

"We would like to stress that at no time was customer data compromised or accessible in any way. We will be looking at ways to compensate players in both EVE and DUST for the outage," the developers said in a statement today.

Security for virtualized datacentres

More from The Register

next story
It's Big, it's Blue... it's simply FABLESS! IBM's chip-free future
Or why the reversal of globalisation ain't gonna 'appen
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Bitcasa bins $10-a-month Infinite storage offer
Firm cites 'low demand' plus 'abusers'
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
Microsoft and Dell’s cloud in a box: Instant Azure for the data centre
A less painful way to run Microsoft’s private cloud
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.