Cyber-Attack Takes Down Pokémon Go

@PoodleCorp Twitter ID

A hacking group going by the name of PoodleCorp has claimed responsibility for a massive DDoS attack which brought down Pokémon Go servers impacting US and European users recently.

The popular augmented reality game Pokémon Go has created a craze across the world, but on Saturday 16 July users took to social media to complain of being unable to access the game. Other users, meanwhile, complained of the game freezing.

PoodleCorp took to Twitter claiming responsibility, while also promising a larger scale attack in the near future. The PoodleCorp twitter account, commenting on the attack, stated: “Just was a test, we will do something on a larger scale soon.”

The online gaming industry has always been somewhat of a honey pot attracting hackers, with notable past attacks seen on the PS4 and Xbox live networks by the Lizard Squad hacking group. Stephanie Weagle, Senior Director at Corero Network Security, said:

"The online gaming industry is highly susceptible to DDoS attacks due to the competitive nature of the games themselves, monetary gains or the notion that organized cyber-crime syndicates can grab headlines with their successful attacks.

"DDoS attack tools are easily procured and at low cost allowing any creative attacker the ability to cause service disruptions at a click of a mouse.

"Traditional security infrastructure, or legacy DDoS mitigation solutions are not sufficient to handle the flood of DDoS attacks, especially since attackers have become more savvy in their techniques; launching low-level, multi-vector attacks that evade scrubbing solutions. In-line, automated DDoS mitigation is the only effective defense in the world of online gaming."

CBRonline:

« The Future Of Big Data Science
Cyber Security is Now Business Critical (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

CertiK

CertiK

CertiK uses rigorous Formal Verification technology to provide hacker-resistant smart contract and blockchain audits, thorough penetration testing, and customized security integrations.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.