Feeds

GitHub code repository rocked by 'very large DDoS' attack

Second attack this month sees hackers git GitHub

High performance access to file storage

San Francisco–based GitHub, the online repository popular among software developers, suffered a major service outage on Thursday morning due to what it characterizes as a "very large DDoS attack."

GitHub status page reporting major DDoS attack

This major attack follows a similar one on August 4th

The outage was first reported on the GitHub Status Messages page at 15:47 UTC (8:47am Pacific Time).

GitHub is a major code repository used by developers across the world. It hosts a mixture of public and private projects split across open and closed source.

The site works using the Git version-control system, which is a commonly used tool of devs across the world to deal with large code projects. Over the past few years, the site has become one of the main places that people push their repositories to, and for that reason an outage has a major effect on the developer community.

Public repositories can be posted for free, but companies must pay to gain private ones. The site is a frequent target of DDoS attacks: the last major attack was on August 4th, and before that July 29th, and before that July 19th.

One potential reason for why it is targeted so frequently is that it is a central repository for a large amount of projects, some of which are closed source. DDoS attacks are frequently used by hackers as a way of probing vulnerabilities in a site, so there is a chance these outages come from probing attempts by hackers keen to get at code stored on the service.

"The site continues to be operational, however we are going to keep the status at yellow while we continue to monitor closesly and work with our upstream providers," the site's Status Messages reported at 9:56 Pacific time. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.