Bonum Certa Men Certa

Brute Force Cracking Attempts Against Techrights

Target: Manchester

Manchester



Summary: An aggressive effort to infiltrate our servers (125,000 times in one day, peaking at particular hours) considerably slowed down the Web site, in spite of overzealous filtering

Negative publicity is something that EPO (as in its management) simply cannot tolerate. Remember how negative paragraphs got removed from news articles after payments from the EPO.



Techrights has, a few times over the years*, come under attacks from numerous entities but at no point in its entire history has it come under the same sorts of attack it must deal with whilst writing about EPO abuses. We suspect there may be a strong correlation between the covered subjects and the willingness to silence the coverage. Almost 80% of our articles are about patents nowadays.

"In our eyes, it was always likely to have been someone connected to the EPO or someone who works there."Yesterday, as some people with special interest in the EPO told us, the site became unavailable. The volume of attacks on Techrights had gone up at around 11AM (G.M.T.) and at some point it doubled to around 50% of all traffic (it was around 25% of the traffic at 11AM). Brute force was being used to overcome our increasingly sophisticated filters, computationally trained and improved after previous such attacks.

Media articles coming from Germany correctly accuse the EPO of all sorts of things (and they cite Techrights), but all of them fail to mention that the EPO banned the whole site (for the first time ever). This in its own right is quite a scandalous thing. This kind of censorship we know about for sure, but we cannot confirm EPO role in the cyber-attacks. Some legitimate visitors (IP addresses) may accidentally get banned (barred from accessing Techrights) because the server is aggressively filtering traffic right now, in an effort to block the cracking attempts. We may have managed to drive away the attacker/s.

Of relevance to this issue are a few older article. Recall when SUEPO came under DDOS attacks (after and before SUEPO E-mails got altogether censored, meaning that a silencing campaign against unions was already well under way). Recall that Techrights came under DDOS attacks at around the same time (an especially sensitive time), leading to reasonable speculations. In our eyes, it was always likely to have been somebody connected to the EPO or someone who works there. For reasons explained here before, without legal action which compels law enforcement to check routers and zombie PCs (botnets), it is hard to know with high enough degree of certainty who commanders and orchestrates all this (the botmaster or script kiddie).

Let us assume that it's a deterrence tactic (against the author/Webmaster/system administrator), or an effort to make it harder for people to access the Web site. Looking back at this nuisance, which started late last year, first was potentially an attack on the Web site (to no avail because my daytime job involves dealing with exactly these types of scenarios and we patiently fought back by filtering any attacks), then blocking the entire site (Office-wide), which makes one wonder what can come next, given that EPO staff can still access the site (off duty).

It has been extremely hard to report abuse about the source of yesterday's attacks on Techrights because the hosting is provided by rogue domain with rogue SSL certificates (or none). It's incredibly hard to obtain contact details. This was a European cluster that attacked the site. Most of the cracking attempts against Techrights come from this same cluster of machines (with IP pool in Spain); we are talking about exceptionally frequent cracking attempts against the CMS (many hundreds of times per minute) and this bypasses caches and other basic defenses. If Techrights was ever forced into a CDN for supposed protection, no doubt there would be no true privacy for visitors. Without filtering, about one quarter of the traffic in Techrights would be cracking attempts, slowing the site down or taking it down for considerably long periods of time (not just seconds). Wonder who’s doing it? We sure wonder, but as people who do this for a living can tell, it's a hard question to answer, especially without access to servers and probably a warrant to legally delve into them.

If these attacks ultimately just try to hijack and deface the site (or obtain a list of visitors), then they aren't doing a very professional job. These must be just brute force login attempts -- many attempts at cracking, perhaps with a common passwords dictionary. Because it's done with brute force (as long as the server can still respond), it induces very high load, as a side effect; hence the server issues. This is similar to what SUEPO reported earlier this year, whereupon it filed a complaint with the authorities. ___ * The first time it happened we lost our Web host and the site was left orphaned, because the Web host was unable and unwilling to help us cope with a DDOS attack on a shared server.

Recent Techrights' Posts

Nonfree Software in My Bank, by Richard Stallman
Updated 8 hours ago
Richard Stallman is Usually Right Because He Thinks "Outside the Box"
he is able to observe society (mores and norms) as somewhat of an outsider
 
This Monday WebProNews Absolutely Flooded the Web With Fake (LLM Slop) 'Articles' About "Linux", Google News Promoted Them as Legitimate
All of the following are fake articles attributed to pseudonyms or authors that don't exist; the images are also slop. Why does Google promote these?
Linuxiac is Not a Slopfarm, But at Least Some of Its Articles Are Machine-Generated Fakes
what we said about it was correct
Expect More Microsoft Layoffs
"Are more job cuts coming?"
Microsoft Behaving Like It's Running Out of Money to Pay Salaries
Does that seem like the behaviour expected from a company which claims it is "worth" trillions?
LWN Downtime Due to Linode, Not LLM Bots
"I’ve received an email letting me know that there is a potential for data loss."
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, July 28, 2025
IRC logs for Monday, July 28, 2025
Links 28/07/2025: Science, Health, and Conflicts
Links for the day
Gemini Links 28/07/2025: Healthy Self-Image With Autism and a "New Life"
Links for the day
Links 28/07/2025: COVID-19 Sped up Brain Aging, "Circumvention is More Popular Than Compliance"
Links for the day
LWN Has Been Down for a Long Time, Another Casualty of LLM Bots?
Time will tell. How much time though?
Slopfarms Versus 'Linux' (and Against People Who Write Real Articles About GNU/Linux)
LLM slop in slopfarms by Brian Fagioli and Redazione RHC
Gemini Links 28/07/2025: Bila Yarrudhanggalangdhuray and Running pkgsrc in a FreeBSD Jail
Links for the day
Microsoft Turns News Sites Into Spamfarms
Is the site The Register MS the next IDG?
The Register MS/The Register US
On Saturday I contacted them for a comment (before issuing criticism)
Hacking revelations at Vatican Jubilee of Digital Missionaries
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, July 27, 2025
IRC logs for Sunday, July 27, 2025
The Week to Come
Planning ahead
LLM Slop Has Only Been a Boon for Misinformation Online
The very same companies that were supposed to maintain quality (again, not limited to Google with PageRank) are now actively participating in generating and spreading slop
When They Tell You It's Free, Does That Mean No Charges (If So, Who's Paying and Why)?
there's "no free lunch"
We're Going to Focus Less on the Molotov Cocktail-Throwing Microsofters and More on Patents
We can get back to focusing on what we wanted to focus on all along
Just Trying to Keep Web Sites Honest (Journalistic Integrity)
the latest articles in LinuxIac are real
Links 27/07/2025: Political Affairs, Data Breaches, Attacks on Freedom of the Press
Links for the day
Gemini Links 27/07/2025: Hot in Japan and Terminal Escape Codes
Links for the day
Links 27/07/2025: More Microsoft Layoffs Coming, Science and Hardware News
Links for the day
Links 27/07/2025: FSF Hackathon and "Hulk Hogan Was a Very Bad Man"
Links for the day
Gemini Links 27/07/2025: DAW Mixer Chains and Simple Software
Links for the day
The Register MS is Inventing or Giving Air Time to New Conspiracy Theories so as to Distort the Narrative As High-Profile Agencies Fall Prey to Microsoft Holes
But the problem is holes, i.e. Microsoft making bad products; the problem is Microsoft
Most Editors at The Register Are American, Including the Editor in Chief, a Decade-Long Microsoft Stenographer (Writing Prose to Sell Microsoft)
It's not easy to tell where the site is based (we tried) because it's hiding behind ClownFlare and CrimeFlare hasn't been well lately
Pushers of systemd Rewrite History (Richard Stallman Said UNIX "Was Portable and Seemed Fairly Clean")
Unlike systemd
"New Techrights" Soon Turns 2 (A Few Days Before the FSF Turns 40)
We have a lot more to say about LLM bots
When Silence Says So Much
Garrett, a 'secure' boot pusher, will need to defend himself in the UK High Court
The Register in Trouble
There is not much that can be done at this point
Trajectory of The Register: From News Site/s Into "B2B"... and Into Microsoft Salespeople
Something isn't right at The Register
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, July 26, 2025
IRC logs for Saturday, July 26, 2025
Misinformation in Social Control Media
Social control media passes around all sorts of tropes
Slopwatch: Fake Linux 'Articles' and Slopfarms With "Linux" in Their Names/Domains
throwing bots at "Linux" to make some fake articles