Hong Kong Protesters Disrupted By Cyber Attacks

Telegram, the secure cloud-based instant messaging and voice over IP service, announced on Wednesday 12th June that it was suffering a “powerful” Distributed Denial of Service (DDoS) attack in Hong Kong which began the day before.  

The company’s founder Pavel Durov said the massive cyber-attack on their messaging service originated in China, which suggests that Beijing tried to disrupt a protest involving hundreds of thousands that erupted on the streets of Hong Kong.  

This attack involved hackers overwhelming a target’s servers by making a massive number of junk requests and Telegram warned users that in many regions may face connection issues.

Many of Hong Kong’s protesters use the encrypted messaging service Telegram to evade electronic surveillance and coordinate their demonstrations against a Beijing-backed plan that allows extraditions from Hong Kong to the mainland.
Demonstrations descended into violence Wednesday as police used tear gas and rubber bullets to disperse protesters who tried to storm the city’s parliament, the worst political crisis Hong Kong has seen since its 1997 handover from Britain to China.

Telegram allows users to exchange encrypted text messages, photos and videos, and also create “channels” for as many as 200,000 people. It also supports encrypted voice calls. It announced last year that it had crossed 200 million monthly active users.

The encrypted messaging app said it experienced a powerful distributed denial of service attack after “garbage requests” flooded its servers and disrupted legitimate communications. Most of those queries came from Chinese Internet protocol addresses, founder Pavel Durov said in a subsequent Twitter post. “This case was not an exception,” he tweeted without elaborating.

Hong Kong’s Political Turbulence and Unrest
Hong Kong is in the throes of political unrest as the Beijing-backed government attempts to force through controversial legislation that would for the first time allow extraditions to China, which protesters fear could be used to squelch government opposition. 

That proposal has ignited a widespread outcry, sending hundreds of thousands of protesters into the city’s streets and triggering violent clashes when demonstrators stormed the legislative chamber Wednesday.
Hong Kong protesters have grown increasingly concerned about legal repercussions as Beijing tightens its influence over the former British colony and the local government prosecutes demonstrators. 

Many protesters masked their faces to avoid facial recognition and avoided using public transit cards that can be voluntarily linked to their identities. An administrator of a large local Telegram group was arrested Tuesday for allegedly conspiring to commit a public nuisance, the South China Morning Post reported.

Hong Kong’s Legislative Council suspended a review of the bill amid the continued threat of protests. The city’s leader, Chief Executive Carrie Lam, is seeking to pass the legislation by the end of the current legislative session in July.

Telegram was created by Durov, a Russian entrepreneur known for his advocacy of internet freedoms. In 2017, he said the service would be registered with Russia’s communications watchdog after it was threatened by a domestic ban. 

Yahoo:       HongKongFreePress

You Might Also Read: 

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach:

 

« Jamie Bartlett: Tech Will Change Us
Is Artificial Intelligence Ready For Your Organisation? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

ClearFocus Technologies

ClearFocus Technologies

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.