Hong Kong Protesters Disrupted By Cyber Attacks

Telegram, the secure cloud-based instant messaging and voice over IP service, announced on Wednesday 12th June that it was suffering a “powerful” Distributed Denial of Service (DDoS) attack in Hong Kong which began the day before.  

The company’s founder Pavel Durov said the massive cyber-attack on their messaging service originated in China, which suggests that Beijing tried to disrupt a protest involving hundreds of thousands that erupted on the streets of Hong Kong.  

This attack involved hackers overwhelming a target’s servers by making a massive number of junk requests and Telegram warned users that in many regions may face connection issues.

Many of Hong Kong’s protesters use the encrypted messaging service Telegram to evade electronic surveillance and coordinate their demonstrations against a Beijing-backed plan that allows extraditions from Hong Kong to the mainland.
Demonstrations descended into violence Wednesday as police used tear gas and rubber bullets to disperse protesters who tried to storm the city’s parliament, the worst political crisis Hong Kong has seen since its 1997 handover from Britain to China.

Telegram allows users to exchange encrypted text messages, photos and videos, and also create “channels” for as many as 200,000 people. It also supports encrypted voice calls. It announced last year that it had crossed 200 million monthly active users.

The encrypted messaging app said it experienced a powerful distributed denial of service attack after “garbage requests” flooded its servers and disrupted legitimate communications. Most of those queries came from Chinese Internet protocol addresses, founder Pavel Durov said in a subsequent Twitter post. “This case was not an exception,” he tweeted without elaborating.

Hong Kong’s Political Turbulence and Unrest
Hong Kong is in the throes of political unrest as the Beijing-backed government attempts to force through controversial legislation that would for the first time allow extraditions to China, which protesters fear could be used to squelch government opposition. 

That proposal has ignited a widespread outcry, sending hundreds of thousands of protesters into the city’s streets and triggering violent clashes when demonstrators stormed the legislative chamber Wednesday.
Hong Kong protesters have grown increasingly concerned about legal repercussions as Beijing tightens its influence over the former British colony and the local government prosecutes demonstrators. 

Many protesters masked their faces to avoid facial recognition and avoided using public transit cards that can be voluntarily linked to their identities. An administrator of a large local Telegram group was arrested Tuesday for allegedly conspiring to commit a public nuisance, the South China Morning Post reported.

Hong Kong’s Legislative Council suspended a review of the bill amid the continued threat of protests. The city’s leader, Chief Executive Carrie Lam, is seeking to pass the legislation by the end of the current legislative session in July.

Telegram was created by Durov, a Russian entrepreneur known for his advocacy of internet freedoms. In 2017, he said the service would be registered with Russia’s communications watchdog after it was threatened by a domestic ban. 

Yahoo:       HongKongFreePress

You Might Also Read: 

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach:

 

« Jamie Bartlett: Tech Will Change Us
Is Artificial Intelligence Ready For Your Organisation? »

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Conceptivity

Conceptivity

Conceptivity provide risk management solutions in the areas of Supply Chain Security, Cyber Security and Critical Infrastructure Protection.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

FinFisher

FinFisher

FinFisher was founded in 2008 with the mission to provide first-class cyber solutions and knowledge for successful operations against organized crime.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.