Hong Kong Protesters Disrupted By Cyber Attacks

Telegram, the secure cloud-based instant messaging and voice over IP service, announced on Wednesday 12th June that it was suffering a “powerful” Distributed Denial of Service (DDoS) attack in Hong Kong which began the day before.  

The company’s founder Pavel Durov said the massive cyber-attack on their messaging service originated in China, which suggests that Beijing tried to disrupt a protest involving hundreds of thousands that erupted on the streets of Hong Kong.  

This attack involved hackers overwhelming a target’s servers by making a massive number of junk requests and Telegram warned users that in many regions may face connection issues.

Many of Hong Kong’s protesters use the encrypted messaging service Telegram to evade electronic surveillance and coordinate their demonstrations against a Beijing-backed plan that allows extraditions from Hong Kong to the mainland.
Demonstrations descended into violence Wednesday as police used tear gas and rubber bullets to disperse protesters who tried to storm the city’s parliament, the worst political crisis Hong Kong has seen since its 1997 handover from Britain to China.

Telegram allows users to exchange encrypted text messages, photos and videos, and also create “channels” for as many as 200,000 people. It also supports encrypted voice calls. It announced last year that it had crossed 200 million monthly active users.

The encrypted messaging app said it experienced a powerful distributed denial of service attack after “garbage requests” flooded its servers and disrupted legitimate communications. Most of those queries came from Chinese Internet protocol addresses, founder Pavel Durov said in a subsequent Twitter post. “This case was not an exception,” he tweeted without elaborating.

Hong Kong’s Political Turbulence and Unrest
Hong Kong is in the throes of political unrest as the Beijing-backed government attempts to force through controversial legislation that would for the first time allow extraditions to China, which protesters fear could be used to squelch government opposition. 

That proposal has ignited a widespread outcry, sending hundreds of thousands of protesters into the city’s streets and triggering violent clashes when demonstrators stormed the legislative chamber Wednesday.
Hong Kong protesters have grown increasingly concerned about legal repercussions as Beijing tightens its influence over the former British colony and the local government prosecutes demonstrators. 

Many protesters masked their faces to avoid facial recognition and avoided using public transit cards that can be voluntarily linked to their identities. An administrator of a large local Telegram group was arrested Tuesday for allegedly conspiring to commit a public nuisance, the South China Morning Post reported.

Hong Kong’s Legislative Council suspended a review of the bill amid the continued threat of protests. The city’s leader, Chief Executive Carrie Lam, is seeking to pass the legislation by the end of the current legislative session in July.

Telegram was created by Durov, a Russian entrepreneur known for his advocacy of internet freedoms. In 2017, he said the service would be registered with Russia’s communications watchdog after it was threatened by a domestic ban. 

Yahoo:       HongKongFreePress

You Might Also Read: 

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach:

 

« Jamie Bartlett: Tech Will Change Us
Is Artificial Intelligence Ready For Your Organisation? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).