Attacks On Hong Kong Protesters

Hong Kong is apparently the target of a huge cyber-attack, with protesters servers first appearing on Saturday 31st August according to Digital Attack Map, which provides information on daily cyber-attacks around the world, showed the financial hub at the center of distributed denial of service, or DDoS, attacks. 

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. 

They often target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information. This appears to be the attack that is going on in Honk Kong.

LIHKG is a forum used by demonstrators to organise mass rallies in Hong Kong, said its servers were hit maliciously by a large DDoS attack in a way that had never seen before. 

While some of LIHKG’s services were interrupted, it was fully restored hours later, according to a Twitter post.
This is the second large cyber-attack to hit apps used this summer by protesters to organise during unrest in Hong Kong. In June, messaging service Telegram said it had been hit by a powerful attack coming out of China.
The protesters’ use of messaging apps and chat rooms has allowed them to quickly change and implement plans, frustrating government efforts to control them.

Hong Kong’s Chief Executive Carrie Lam said recently that she wouldn’t rule out all measures to quell protests, including invoking an emergency rule that would allow her to unilaterally shut down the Internet or selectively block apps that were helping protesters organise.

Digital Attack Map:             Bloomberg:   

You Might Also Read:

Hong Kong Protesters Disrupted By Cyber Attacks:
 

« The Digital Future Is About Disintegration
Stuxnet Virus Attack Details Emerge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.