Risk
6/4/2009
04:55 PM
50%
50%

Hackers Arrested In China After Feud Causes Major Outage

DDoS feud between underground gaming services allegedly caused temporary Internet outage across more than 20 provinces

Four individuals have been arrested in China after an alleged denial-of-service "war" between underground gaming services spun out of control, according to news reports.

According to a report by Xinhua News Agency, China's Ministry of Public Security said Tuesday that the suspects were detained on May 29 following police investigations in the Jiangsu, Zhejiang, and Guangdong provinces. The suspects were not named, although the surnames of two -- Xu and Wang -- were released.

The ministry told the news agency that on May 19, the suspects allegedly launched a distributed denial-of-service (DDoS) attack against the servers of DNSPod, a Chinese DNS provider and domain registrar.

According to the report, the DDoS attacks were motivated by fierce competition between unauthorized online gaming service providers, which lure gamers from official providers with less limited and free access. In order to sabotage "competitors," the suspects began an attack against DNSPod, which provides access to some of those unauthorized gaming sites.

Unfortunately, the attack triggered a chain reaction because DNSPod's servers were also used by Baofeng, a highly popular Chinese video-streaming service.

"Once millions of Baofeng users submitted their video application, their unanswered DNS requests were passed on to higher-level servers that didn't know how to process them," the news report says. "The requests piled up, and the resulting traffic jam slowed or halted Internet access."

Internet users in more than 20 provinces were affected on May 19, the ministry said. It was described as the "worst Internet incident in China" since an earthquake damaged undersea cables near Taiwan on Dec. 26, 2006.

Internet access returned to normal several hours later. But the incident caused widespread calls in China for increasing safety measures of Internet, according to the report.

Baofeng reportedly has announced it will recall 120 million online video playing software whose faulty design was believed to have automatically caused continuous requests on the server.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.