{"id":843,"date":"2016-01-06T16:02:40","date_gmt":"2016-01-06T13:02:40","guid":{"rendered":"https:\/\/forklog.media\/?p=843"},"modified":"2016-01-06T16:02:40","modified_gmt":"2016-01-06T13:02:40","slug":"btcc-resisted-a-harsh-ddos-attack","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/btcc-resisted-a-harsh-ddos-attack\/","title":{"rendered":"BTCC Resisted a Harsh DDoS Attack"},"content":{"rendered":"<p>One of the world&#8217;s biggest digital currency exchanges has reported to suffer a severe DDoS attack on New Year&#8217;s eve. The extortionists behind the attack demanded a ransom of 1 BTC to cease the DDoS attack.<\/p>\n<p>During the attack, the exchange tweeted: <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Our website is under DDoS attack, which is hampering access to our APIs and other services. We are working quickly to resolve the situation.<\/p>\n<p>&mdash; BTCC (@BTCCexchange) <a href=\"https:\/\/twitter.com\/BTCCexchange\/status\/682753494160244739?ref_src=twsrc%5Etfw\">January 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The attack was set in seveal phases. Initially, the exchange received an anonymous e-mail demanding a ransom to the tune of 1 BTC right away. The e-mail also hinted that the attack would continue unless the exchange pays. The company, however, returned no reply, so the attack continued.<\/p>\n<p>However, it proved much more severe that the company could expect, as it reached 10 Gbps, though it lasted short. Following the phase, BTCC received yet another message from the extortionists reading: &#8220;Now you have a taste of what we&#8217;re capable of. Please pay us 10 BTC immediately or more attacks will follow.&#8221;<\/p>\n<p>In order to provide better protection from DDoS attacks, the company had to increase its expenses on professional protection services. However, it did not reply to the extortionist&#8217;s e-mail again, so the attack continued. It lasted for several hours and caused some performance and functionality failures. However, the exchange managed to upgrade their servers.<\/p>\n<p>After the tidal wave subsided, the extortionists hitted them up again, now demanding even more money: <\/p>\n<blockquote><p><strong>&#8220;We will keep these attacks up until you pay! The price is now 30 BTC. You had better pay up before you go bankrupt! Mwa ha ha!&#8221;<\/strong><\/p><\/blockquote>\n<p>The exchange returned no reply once again, and did not pay a single satoshi, so the attack continued. Eventually, the extoritionists gave up and proposed to call it a draw having significantly cut the ransom: <\/p>\n<blockquote><p><strong>&#8220;Hey, guys, look, I&#8217;m really a nice person. I don&#8217;t want to put you all out of business. What do you say we just make it 0.5 BTC and call it even?&#8221;<\/strong><\/p><\/blockquote>\n<p>However, BTCC did not reply to that e-mail either, so the attacks ceased, and they received the last message from the nice person in question, where he or she couldn&#8217;t resist to have the last word:<\/p>\n<blockquote><p><strong>&#8220;Do you even speak English?&#8221;<\/strong> it read.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>One of the world&#8217;s biggest digital currency exchanges has reported to suffer a severe DDoS attack on New Year&#8217;s eve. The extortionists behind the attack demanded a ransom of 1 BTC to cease the DDoS attack. During the attack, the exchange tweeted: Our website is under DDoS attack, which is hampering access to our APIs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[166,48,43],"class_list":["post-843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-btcc","tag-exchanges","tag-hackers"],"aioseo_notices":[],"amp_enabled":true,"views":"95","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=843"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/843\/revisions"}],"predecessor-version":[{"id":845,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/843\/revisions\/845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/723"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}