Feeds

EVE Online OFFLINE: Wannabe Capt Kirks clobbered in cluster-ruck

Server plugs pulled as aliens sink nerds' battleships

Protecting against web application threats using SSL

Updated Multiplayer spaceship game EVE Online has taken its systems offline after it was warped out of shape by a debilitating denial-of-service attack.

In a statement on Facebook, its developers at CCP Games explained that it disconnected its server cluster from the internet as a precaution while it reviewed the integrity and defences of its infrastructure:

At 02:05 GMT June 2nd, CCP became aware of a significant and sustained distributed denial-of-service attack (DDoS) against the Tranquility cluster (which houses EVE Online and DUST 514) and web servers.

Our policy in such cases is to mobilize a taskforce of internal and external experts to evaluate the situation. At 03:07 GMT, that group concluded that our best course of action was to go completely offline while we put in place mitigation plans.

While we initially reopened EVE Online and DUST 514, we have since re-evaluated. With the highest sense of precaution we have taken Tranquility and associated websites back down for further investigation and an exhaustive scan of our entire infrastructure. We will update you more frequently via our Twitter feed (www.twitter.com/eveonline), however, an extended service interruption of several hours is expected as this process should not be rushed.

Role-playing game EVE Online, once memorably described by a player as having “the learning curve of putting a 5-year-old through a nuclear physics masters degree” has, over recent years, become a forum where rival gamers, gold farmers and occasionally hacktivists such as LulzSec slug it out.

In some ways the real-world action is much colourful than the space-cruiser-on-battleship action that the game actually offers, but it's rare for systems to be taken offline. Progress towards resolving the problem can be found on Eve Online's Twitter feed here. ®

Updated to add

Eve Online's Tranquility server cluster is now coming back online. The team said it discovered someone exploiting a vulnerability in its backend systems, and has patched the bug.

"We would like to stress that at no time was customer data compromised or accessible in any way. We will be looking at ways to compensate players in both EVE and DUST for the outage," the developers said in a statement today.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Wanna keep your data for 1,000 YEARS? No? Hard luck, HDS wants you to anyway
Combine Blu-ray and M-DISC and you get this monster
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
US boffins demo 'twisted radio' mux
OAM takes wireless signals to 32 Gbps
Apple flops out 2FA for iCloud in bid to stop future nude selfie leaks
Millions of 4chan users howl with laughter as Cupertino slams stable door
Students playing with impressive racks? Yes, it's cluster comp time
The most comprehensive coverage the world has ever seen. Ever
Run little spreadsheet, run! IBM's Watson is coming to gobble you up
Big Blue's big super's big appetite for big data in big clouds for big analytics
Seagate's triple-headed Cerberus could SAVE the DISK WORLD
... and possibly bring us even more HAMR time. Yay!
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.