Attacks On Hong Kong Protesters

Hong Kong is apparently the target of a huge cyber-attack, with protesters servers first appearing on Saturday 31st August according to Digital Attack Map, which provides information on daily cyber-attacks around the world, showed the financial hub at the center of distributed denial of service, or DDoS, attacks. 

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. 

They often target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information. This appears to be the attack that is going on in Honk Kong.

LIHKG is a forum used by demonstrators to organise mass rallies in Hong Kong, said its servers were hit maliciously by a large DDoS attack in a way that had never seen before. 

While some of LIHKG’s services were interrupted, it was fully restored hours later, according to a Twitter post.
This is the second large cyber-attack to hit apps used this summer by protesters to organise during unrest in Hong Kong. In June, messaging service Telegram said it had been hit by a powerful attack coming out of China.
The protesters’ use of messaging apps and chat rooms has allowed them to quickly change and implement plans, frustrating government efforts to control them.

Hong Kong’s Chief Executive Carrie Lam said recently that she wouldn’t rule out all measures to quell protests, including invoking an emergency rule that would allow her to unilaterally shut down the Internet or selectively block apps that were helping protesters organise.

Digital Attack Map:             Bloomberg:   

You Might Also Read:

Hong Kong Protesters Disrupted By Cyber Attacks:
 

« The Digital Future Is About Disintegration
Stuxnet Virus Attack Details Emerge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.