10.20.15

Gemini version available ♊︎

Brute Force Cracking Attempts Against Techrights

Posted in Site News at 4:55 am by Dr. Roy Schestowitz

Target: Manchester

Manchester

Summary: An aggressive effort to infiltrate our servers (125,000 times in one day, peaking at particular hours) considerably slowed down the Web site, in spite of overzealous filtering

Negative publicity is something that EPO (as in its management) simply cannot tolerate. Remember how negative paragraphs got removed from news articles after payments from the EPO.

Techrights has, a few times over the years*, come under attacks from numerous entities but at no point in its entire history has it come under the same sorts of attack it must deal with whilst writing about EPO abuses. We suspect there may be a strong correlation between the covered subjects and the willingness to silence the coverage. Almost 80% of our articles are about patents nowadays.

“In our eyes, it was always likely to have been someone connected to the EPO or someone who works there.”Yesterday, as some people with special interest in the EPO told us, the site became unavailable. The volume of attacks on Techrights had gone up at around 11AM (G.M.T.) and at some point it doubled to around 50% of all traffic (it was around 25% of the traffic at 11AM). Brute force was being used to overcome our increasingly sophisticated filters, computationally trained and improved after previous such attacks.

Media articles coming from Germany correctly accuse the EPO of all sorts of things (and they cite Techrights), but all of them fail to mention that the EPO banned the whole site (for the first time ever). This in its own right is quite a scandalous thing. This kind of censorship we know about for sure, but we cannot confirm EPO role in the cyber-attacks. Some legitimate visitors (IP addresses) may accidentally get banned (barred from accessing Techrights) because the server is aggressively filtering traffic right now, in an effort to block the cracking attempts. We may have managed to drive away the attacker/s.

Of relevance to this issue are a few older article. Recall when SUEPO came under DDOS attacks (after and before SUEPO E-mails got altogether censored, meaning that a silencing campaign against unions was already well under way). Recall that Techrights came under DDOS attacks at around the same time (an especially sensitive time), leading to reasonable speculations. In our eyes, it was always likely to have been somebody connected to the EPO or someone who works there. For reasons explained here before, without legal action which compels law enforcement to check routers and zombie PCs (botnets), it is hard to know with high enough degree of certainty who commanders and orchestrates all this (the botmaster or script kiddie).

Let us assume that it’s a deterrence tactic (against the author/Webmaster/system administrator), or an effort to make it harder for people to access the Web site. Looking back at this nuisance, which started late last year, first was potentially an attack on the Web site (to no avail because my daytime job involves dealing with exactly these types of scenarios and we patiently fought back by filtering any attacks), then blocking the entire site (Office-wide), which makes one wonder what can come next, given that EPO staff can still access the site (off duty).

It has been extremely hard to report abuse about the source of yesterday’s attacks on Techrights because the hosting is provided by rogue domain with rogue SSL certificates (or none). It’s incredibly hard to obtain contact details. This was a European cluster that attacked the site. Most of the cracking attempts against Techrights come from this same cluster of machines (with IP pool in Spain); we are talking about exceptionally frequent cracking attempts against the CMS (many hundreds of times per minute) and this bypasses caches and other basic defenses. If Techrights was ever forced into a CDN for supposed protection, no doubt there would be no true privacy for visitors. Without filtering, about one quarter of the traffic in Techrights would be cracking attempts, slowing the site down or taking it down for considerably long periods of time (not just seconds). Wonder who’s doing it? We sure wonder, but as people who do this for a living can tell, it’s a hard question to answer, especially without access to servers and probably a warrant to legally delve into them.

If these attacks ultimately just try to hijack and deface the site (or obtain a list of visitors), then they aren’t doing a very professional job. These must be just brute force login attempts — many attempts at cracking, perhaps with a common passwords dictionary. Because it’s done with brute force (as long as the server can still respond), it induces very high load, as a side effect; hence the server issues. This is similar to what SUEPO reported earlier this year, whereupon it filed a complaint with the authorities.
___
* The first time it happened we lost our Web host and the site was left orphaned, because the Web host was unable and unwilling to help us cope with a DDOS attack on a shared server.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Links 04/06/2023: Why Flatpak and Wealth of Devices With GNU/Linux

    Links for the day



  2. Gemini Links 04/06/2023: Rosy Crow 1.1.3 and NearlyFreeSpeech.NET

    Links for the day



  3. IRC Proceedings: Saturday, June 03, 2023

    IRC logs for Saturday, June 03, 2023



  4. Links 04/06/2023: Azure Outage Again (So Many!) and Tiananmen Massacre Censored

    Links for the day



  5. Links 03/06/2023: Qubes OS 4.2.0 RC1 and elementaryOS Updates for May

    Links for the day



  6. Gemini Links 03/06/2023: Hidden Communities and Exam Prep is Not Education

    Links for the day



  7. Links 03/06/2023: IBM Betraying LibreOffice Some More (After Laying off LibreOffice Developers)

    Links for the day



  8. Gemini Links 03/06/2023: Bubble Woes and Zond Updates

    Links for the day



  9. Links 03/06/2023: Apache NetBeans 18 and ArcaOS 5.0.8

    Links for the day



  10. IRC Proceedings: Friday, June 02, 2023

    IRC logs for Friday, June 02, 2023



  11. The Developing World Abandons Microsoft Windows, GNU/Linux at All-Time Highs on Desktops/Laptops

    Microsoft, with 80 billion dollars in longterm debt and endless layoffs, is losing the monopolies; the media doesn’t mention this, but some publicly-accessible data helps demonstrate that



  12. Links 02/06/2023: Elive ‘Retrowave’ Stable and Microsoft's Half a Billion Dollar Fine for LinkeIn Surveillance in Europe

    Links for the day



  13. Linux Foundation 'Research' Has a New Report and Of Course It Uses Only Proprietary Software

    The Linux Foundation has a new report, promoted by Clickfraud Spamnil and others; of course they’re rejecting Free software, they’re just riding the “Linux” brand and speak of “Open Source” (which they reject themselves)



  14. Links 02/06/2023: Arti 1.1.5 and SQL:2023

    Links for the day



  15. Gemini Links 02/06/2023: Vimwiki Revisited, SGGS Revisited

    Links for the day



  16. Geminispace/GemText/Gemini Protocol Turn 4 on June 20th

    Gemini is turning 4 this month (on the 20th, according to the founder) and I thought I’d do a spontaneous video about how I use Gemini, why it's so good, and why it’s still growing (Stéphane Bortzmeyer fixed the broken cron job — or equivalent of it — a day or two after I had mentioned the issue)



  17. HMRC Does Not Care About Tax Fraud Committed by UK Government Contractor, Sirius 'Open Source'

    The tax crimes of Sirius ‘Open Source’ were reported to HMRC two weeks ago; HMRC did not bother getting back to the reporters (victims of the crime) and it’s worth noting that the reporters worked on UK government systems for many years, so maybe there’s a hidden incentive to bury this under the rug



  18. Our IRC at 15th Anniversary

    So our IRC community turns 15 today (sort of) and I’ve decided to do a video reflecting on the fact that some of the same people are still there after 15 years



  19. IRC Proceedings: Thursday, June 01, 2023

    IRC logs for Thursday, June 01, 2023



  20. Links 02/06/2023: NixOS 23.05 and Rust 1.70.0

    Links for the day



  21. Gemini Links 02/06/2023: Flying High With Gemini and Gogios Released

    Links for the day



  22. Links 01/06/2023: KStars 3.6.5 and VEGA ET1031 RISC-V Microprocessor in Use

    Links for the day



  23. Gemini Links 01/06/2023: Scam Call and Flying High With Gemini

    Links for the day



  24. Links 01/06/2023: Spleen 2.0.0 Released and Team UPC Celebrates Its Own Corruption

    Links for the day



  25. IRC Proceedings: Wednesday, May 31, 2023

    IRC logs for Wednesday, May 31, 2023



  26. Tux Machines Closing the Door on Twitter Because Twitter is Dead (for a Lot of People)

    Tux Machines recently joined millions of others who had already quit Twitter, including passive posting (fully or partly automated)



  27. Links 31/05/2023: Inkscape’s 1.3 Plans and New ARM Cortex-A55-Based Linux Chip

    Links for the day



  28. Gemini Links 31/05/2023: Personality of Software Engineers

    Links for the day



  29. Links 31/05/2023: Armbian 23.05 Release and Illegal UPC

    Links for the day



  30. IRC Proceedings: Tuesday, May 30, 2023

    IRC logs for Tuesday, May 30, 2023


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts