
Aug 13, 2012
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
Why Your Ongoing Support Is Essential
Donald Trump’s attacks on democracy, justice, and a free press are escalating — putting everything we stand for at risk. We believe a better world is possible, but we can’t get there without your support. Common Dreams stands apart. We answer only to you — our readers, activists, and changemakers — not to billionaires or corporations. Our independence allows us to cover the vital stories that others won’t, spotlighting movements for peace, equality, and human rights. Right now, our work faces unprecedented challenges. Misinformation is spreading, journalists are under attack, and financial pressures are mounting. As a reader-supported, nonprofit newsroom, your support is crucial to keep this journalism alive. Whatever you can give — $10, $25, or $100 — helps us stay strong and responsive when the world needs us most. Together, we’ll continue to build the independent, courageous journalism our movement relies on. Thank you for being part of this community. |
Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
We've had enough. The 1% own and operate the corporate media. They are doing everything they can to defend the status quo, squash dissent and protect the wealthy and the powerful. The Common Dreams media model is different. We cover the news that matters to the 99%. Our mission? To inform. To inspire. To ignite change for the common good. How? Nonprofit. Independent. Reader-supported. Free to read. Free to republish. Free to share. With no advertising. No paywalls. No selling of your data. Thousands of small donations fund our newsroom and allow us to continue publishing. Can you chip in? We can't do it without you. Thank you.