Blizzard EU servers are getting DDOSed once again this week (4th time) and there is pretty much no posts about it. Cant Blizzard use the help of the authorities to track down this "hackers" and deal with the issue for now?
Blizzard EU servers are getting DDOSed once again this week (4th time) and there is pretty much no posts about it. Cant Blizzard use the help of the authorities to track down this "hackers" and deal with the issue for now?
Battle.net went down for me for like 5 minutes. Not affected anything in game.
Zetheros Cralin Leteros Xerophin Duskeros Vanderos
Atheros Zenderos Magmeros Battistta Denzeros
First off yes is it proven it is ddos or just an easy excuse? Could be getting ready for legion right?
Secondly you do realize for the most parts these ddoser's do it from countries that either completely won't work with the authorities on this or do so very slightly. Really isn't much they can do if a true ddos attack.
I'm sure they'll handle it. I don't know who's spending that kind of money, or why, but I bet it's important to them..
Most of the time the computers doing the actual "attack" are part of a botnet and the computer owner has NO clue what is going on since the botnet follows instructions from a command and control unit (or handler). The guy/gal who pushes the button to trigger the attack is generally much harder to trace than it is to find the zombie computers who are doing the actual gruntwork. But the reality is they are victims too.
As someone mentioned already mentioned, many times the actual perpetrator of the attack is located in a jurisdiction that either has no cyberlaws or their laws are hopelessly outdated and even if you COULD track him/her down, there's almost no chance of prosecution in their own locale and no extradition to another country with more complete cyberlaws.
Is it frustrating? Hell yes. Should you "hack back"? Hell no!
There are ways to mitigate the effects of a DDoS (and I'm pretty certain Blizzard has already got those in place), but there is no way to completely stop them or prevent them. I'm virtually positive we'll see even more of these next week around the Legion launch since some people's "fun" consists of fucking things up for other people. While I think castration is suitable punishment for DDoS perpetrators, see my comment above about how difficult it is to track down the real culprits.
A DDoS by its nature is not something that could be policed by a single country.
It is using a number of zombie machines, most likely being controlled by malware.
And they are likely in a number of different countries.
If it was that simple, why would they still be an issue.
Notice how they tend to attack the service providers rather than blizzard themselves.
They are attacking the infrastructure, which is obviously more prone to attack, and impacting the players more than they are blizzard.
Team America!....fuck yeah
https://www.youtube.com/watch?v=U1mlCPMYtPk
--------------------------------------------------------------------------------
Essentia@Cho'gall of Inebriated Raiding.
http://us.battle.net/wow/en/characte...ssentia/simple
http://masteroverwatch.com/profile/pc/us/Tharkkun-1222
You do realize DDoS is using MULTIPLE (hundreds/thousands) of different endpoints to facilitate the attack. Not nearly as simple as you think it is.
- - - Updated - - -
"Clean their own networks"? What exactly are you referring to? These are public facing I.P.s what are you supposed to ''clean'' exactly? All you can do is reroute traffic, change IPs, block traffic from those flagged incoming external I.P.s and so forth. It's not like its something native in their infrastructure that's the issue.
Blizzard should really get some DDoS protection with all the money they make Kappa
They have DDOS protection. But these are public facing authentication servers that are being flooded. All you need is some code that will simulate a login request thousands of times per second. Then place this code on a botnet and voila. Blizzard then needs to start blocking or re-routing the IP's to backup authentication servers.
--------------------------------------------------------------------------------
Essentia@Cho'gall of Inebriated Raiding.
http://us.battle.net/wow/en/characte...ssentia/simple
http://masteroverwatch.com/profile/pc/us/Tharkkun-1222
Facebook ? meh.
Sorry, my post was unclear, should have specified..
I meant the originating operators could null route the attack traffic. Destination-based blackholing. Or selective blackholing through control communities.
They could also rate-limit the protocols used - if everyone rate limited NTP and SNMP (and SSDP and Chargen) the net would be much cleaner place. And if everyone actually patched and configured their crappy NTP and SNMP servers correctly we wouldn't have silly automatic amplifying vectors.
The upstream operators could also offload the traffic to other IXP's and "share" the load.
Or.. maybe dynamic inter-domain flowspec config? (which is treated more or less like black magic these days)
But none of the operators actually care enough to do this and it requires them to work together and that's a huge hurdle. So it continues.
Last edited by mmoc53950756e3; 2016-08-26 at 09:01 PM.