SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
Donald Trump’s attacks on democracy, justice, and a free press are escalating — putting everything we stand for at risk. We believe a better world is possible, but we can’t get there without your support. Common Dreams stands apart. We answer only to you — our readers, activists, and changemakers — not to billionaires or corporations. Our independence allows us to cover the vital stories that others won’t, spotlighting movements for peace, equality, and human rights. Right now, our work faces unprecedented challenges. Misinformation is spreading, journalists are under attack, and financial pressures are mounting. As a reader-supported, nonprofit newsroom, your support is crucial to keep this journalism alive. Whatever you can give — $10, $25, or $100 — helps us stay strong and responsive when the world needs us most. Together, we’ll continue to build the independent, courageous journalism our movement relies on. Thank you for being part of this community. |
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."
UPDATE: Wikileaks reported Monday evening that it was back online after a week-long DDoS attack.
* * *
Whistleblowing organization Wikileaks says it continues to suffer a distributed denial-of-service (DDoS) attack.
The organization first reported the attack, which has expanded to include affiliated sites, on Aug. 3. The groups says 10 gigabits of bogus traffic per second are flooding its site.
On Friday, Wikileaks gave this update on the attacks:
Today, through a series of tweets, WikiLeaks explained in detail the attack they are facing:
More information on the ongoing DDoS attack against WikiLeaks related sites and donation infrastructure follows:
- The attack is well over 10Gbits/second sustained on the main WikiLeaks domains.
- The bandwidth is used is so huge it is impossible to filter without specialized hardware, however...
- the DDoS is not simple bulk UDP or ICMP packet flooding, so most hardware filters won't work either.
- The rage of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them.
- We have even tried moving behind https://Cloudflare.com but Cloudflare has re-emptively banned WikiLeaks. Living in the wild wild west.
RT notes that the "attack coincided with WikiLeaks' release of a new portion of emails allegedly acquired by the hacktivist group Anonymous from the server of consulting firm Stratfor. The batch concerns the supposed existence of a US-based system called TrapWire, which allegedly collects images from surveillance cameras across America and uses them to track people for possible threats."