Feeds

Dropbox outage was caused by 'buggy' upgrade: DDoS us? You hardly know us...

1775Sec: Um, we were trolling for, er, Aaron Swartz...

High performance access to file storage

Pranksters latched onto an outage at Dropbox on Friday to push false rumours of a politically motivated hack.

A group calling itself 1775Sec claimed that it had taken advantage of a vulnerability to knock out the widely used sync-and-share service. These claims were reported by sections of the media over the weekend.

Dropbox denied the claim on Sunday, stating that the outage had happened after routine maintenance went awry and apologising for the resulting problems.

The entire service was rendered unavailable by the snafu for around three hours with lingering problems intermittently affecting the service for much longer, a statement on Dropbox's official blog explains.

On Friday evening we began a routine server upgrade. Unfortunately, a bug installed this upgrade on several active servers, which brought down the entire service. Your files were always safe, and despite some reports, no hacking or DDOS attack was involved.

While we restored most functionality three hours later, some users continued experiencing issues throughout the weekend across dropbox.com, our desktop client, and our mobile apps. Dropbox should now be up and running for all of you, but we’re working through a few last issues with the Dropbox photos tab.

1775Sec withdrew claims of a cyber attack even before Dropbox's initial denials, stating that its boasts were a ruse designed to expose credulous tech reporting.

"Did anyone bother to do some research. lol. We made the Internet Reporters look like fools! That is what we did in your honor Aaron Swartz," the group said in a Twitter update.

1775Sec, self-described purveyors of ‪#OpTrollSec‬ For the Lulz, has since since claimed that it has managed to get its hands on an Apple database, posting a supposed sample on Pastebin ahead of a threatened leak on Tuesday. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.