Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Hackers Arrested In China After Feud Causes Major Outage

DDoS feud between underground gaming services allegedly caused temporary Internet outage across more than 20 provinces

Four individuals have been arrested in China after an alleged denial-of-service "war" between underground gaming services spun out of control, according to news reports.

According to a report by Xinhua News Agency, China's Ministry of Public Security said Tuesday that the suspects were detained on May 29 following police investigations in the Jiangsu, Zhejiang, and Guangdong provinces. The suspects were not named, although the surnames of two -- Xu and Wang -- were released.

The ministry told the news agency that on May 19, the suspects allegedly launched a distributed denial-of-service (DDoS) attack against the servers of DNSPod, a Chinese DNS provider and domain registrar.

According to the report, the DDoS attacks were motivated by fierce competition between unauthorized online gaming service providers, which lure gamers from official providers with less limited and free access. In order to sabotage "competitors," the suspects began an attack against DNSPod, which provides access to some of those unauthorized gaming sites.

Unfortunately, the attack triggered a chain reaction because DNSPod's servers were also used by Baofeng, a highly popular Chinese video-streaming service.

"Once millions of Baofeng users submitted their video application, their unanswered DNS requests were passed on to higher-level servers that didn't know how to process them," the news report says. "The requests piled up, and the resulting traffic jam slowed or halted Internet access."

Internet users in more than 20 provinces were affected on May 19, the ministry said. It was described as the "worst Internet incident in China" since an earthquake damaged undersea cables near Taiwan on Dec. 26, 2006.

Internet access returned to normal several hours later. But the incident caused widespread calls in China for increasing safety measures of Internet, according to the report.

Baofeng reportedly has announced it will recall 120 million online video playing software whose faulty design was believed to have automatically caused continuous requests on the server.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4560
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2019-4589
PUBLISHED: 2020-08-03
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.
CVE-2020-4328
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839.
CVE-2020-4377
PUBLISHED: 2020-08-03
IBM Cognos Anaytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 179156.
CVE-2020-4534
PUBLISHED: 2020-08-03
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper handling of UNC paths. By scheduling a task with a specially-crafted UNC path, an attacker could exploit this vulnerability to execute arbi...