Telegram App Targeted in DDoS Cyberattack

Telegram App Targeted in DDoS Cyberattack

An DDoS attack aimed at slowing connectivity for the Telegram app took place this week. The cyberattack coincided with large protests in Hong Kong, and with most of the IP addresses coming from China, it is speculated that they were involved in the attack.

The Telegram messaging app was overloaded by a DDoS cyberattack this week. The attack was performed in order to flood the app with so much traffic that it slowed users’ connectivity – it was not an attempt to steal users’ data.

The attack coincided with large protests in Hong Kong over an extradition bill with China. Many of the protesters were said to have been communicating over the Telegram app, as there are ways to encrypt messages end-to-end to ensure privacy. Because of this strenuous encryption, the app has been used in terrorist attacks as communication previously, and was the subject of an Iranian government controversy last year.

Pavel Durov, the founder of Telegram, said in a tweet that the IP addresses mostly came from China and consisted of 200-400 Gb/s of clutter.

“Historically, all state actor-sized (attacks) we experienced coincided in time with protests in Hong Kong,” Durov said. “This case was not an exception.”

The attack did not only affect Asia though, but any country that was using the app. The company said in a tweet that the Americas and some users from other countries may experience connection issues.

Paul Bischoff, a privacy advocate at Comparitech.com, said that Durov has good reason to suspect China is the reason for this DDoS attack.

“Telegram CEO Pavel Durov isn’t crazy for suspecting the Chinese government is targeting Telegram,” Bischoff said. “It wouldn’t be the first time that China has weaponized botnets – a group of computers that can be controlled from a single command and control point – to target websites with DDoS attacks.”

Bischoff said in 2015, the largest DDoS attack in history up to that point was attributed to China. The attack was aimed at two censorship circumvention tools hosted on the Github site.

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.