WordPress: DDoS attacks came from China

The attacks have been described as the site's largest in its six-year history
  • (IDG News Service)
  • — 07 March, 2011 18:00

The large distributed denial of service (DDoS) attacks that hit the WordPress.com blog publishing platform last week originated from China, according to the founder of the site.

A DDOS attack involves harnessing hundreds or thousands of computers to simultaneously bombard a web site with data so it becomes overwhelmed. The computers in such attacks have typically been infected with malware so they can be used without the consent and awareness of their owners.

The attacks, which brought slowdowns to the WordPress.com site, were severe enough to interfere with the company's three data centers in Chicago, San Antonio and Dallas. The site has since returned to normal as of Monday.

WordPress said last week the attacks might have been politically motivated and aimed at an unnamed Chinese-language blog, but it no longer has that view.

"Don't think it's politically motivated anymore," WordPress Founder Matt Mullenweg said in an e-mail to IDG News Service. "However the attacks did originate in China."

Mullenweg did not elaborate on the change in view or offer details on the source of the attacks.

The attacks directed "multiple Gigabits per second and tens of millions of packets per second" and were the "largest and most sustained" in its six-year history, Mullenweg previously said.

China has been frequently named as the country of origin for several major cyberattacks. Chinese hackers have been accused of launching cyber attacks to steal gigabytes of data from foreign energy companies, according to security vendor McAfee. In 2009, Google was also the victim of an attack that it alleged originated from China.

Very often the true source of a DDOS attack is unclear. While computers launching the attacks might be based in one country, they could be under control of hackers in a third country. Users at high risk of malware infections that can be used for DDOS attacks are those that don't run anti-virus software, don't keep their operating system updated or are running pirated operating systems that can't be updated.

The Chinese government has responded to these reports, saying it denies being involved in any cyber attacks. "The allegation that China supports hacking is groundless," a China foreign ministry spokesman said last month.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Michael Kan

IDG News Service
Topics: Internet-based applications and services, security, Wordpress, social media, internet

Comments

drapes curtains

1

Heya this subject is hugely concerning. Keep it going teammate !

acheter Kamagra Oral Jelly

2

I twitt it. My twitter on name Alexander Belluchi. You can comment this post there too.

Motrin

6

It absolutely harmonize with the erstwhile message

unceteocava

7

Rapidamente coerente ))))

bisy-net

8

I like this this
Yes, logically correctly

bisy-net

Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?