Telegram DDoS Attack – Messaging App Suffers 200GBps Pounding

Outsmart Malicious Hackers


For those not familiar before we get to the Telegram DDoS attack, Telegram is an instant messaging system focusing on privacy and multi-platform availability. It was launched by the founders of VK, the largest social network in Russia and is run as an independent non-profit company in Germany.

The client code is open-source and audited and various implementations can be found by various individuals based on the API.

Telegram DDoS Attack - Messaging App Suffers 200GBps Pounding

Just a few days ago, users in South East Asia were having difficulty accessing the service and Telegram announced they were suffering a huge DDoS attack.

Popular messaging platform Telegram has been hit with a 200Gbps distributed denial of service (DDoS) attack.

The Tsunami TCP SYN flood kicked off on Friday and hurt users in Asia, Australia, and Oceania, knocking out the service for some five percent of the company’s 60 million active users it has gained in 18 months.

It is a new form of DDoS attack discovered October by Radware security folk who say it is different from regular SYN floods in that it transmits large 100 byte packet sizes about double the regular 40 to 60 byte size.

That Radware says defeats many defense algorithms and quickly consumes bandwidth making even a modest attack clock some four to five gigabits per second.


It seems to be a slight variation of the regular SYN flood with a larger packet size that quickly consumes network resources.

With a 100,000 nodes involved the attack generating over 200GBps of bandwidth – it’s a fairly substantial attack.

The garbage traffic came from about a hundred thousand infected servers, most noticeably, in LeaseWeb B.V., Hetzner Online AG, PlusServer AG, NFOrce Entertainment BV, Amazon and Comcast networks,” Telegram says.

“That said, the attack was distributed evenly across thousands of hosts and none contributed more than five percent of the total volume … by now we know that the attack is being coordinated from East Asia.

“Attacks on the scale of the one we‘re facing today have become possible only recently and it’s the first time we‘ve met anything like this.”

The company says it did not want to discuss its mitigation measures in the event that it could give pointers to attackers unknown.

“Our sysadmin cyborgs are working on this 24 hours a day.”

The attack follows a bizarre smaller DDoS that followed a move by the company to introduce free custom stickers over the service.

It seems like no clear reason why Telegram is the target of this attack, some conspiracy theories claim it to be because of the free custom stickers – which other similar messaging apps make money from.

That seems a little far fetched though, we’ll keep an eye out and see if any more information emerges.

Source: The Register

Posted in: Networking Hacking


Latest Posts:


Spaghetti Download - Web Application Security Scanner Spaghetti Download – Web Application Security Scanner
Spaghetti is an Open-source Web Application Security Scanner, it is designed to find various default and insecure files, configurations etc.
Taringa Hack - 27 Million User Records Leaked Taringa Hack – 27 Million User Records Leaked
The Taringa hack is actually one of the biggest leaks of the year with 27 million weakly hashed passwords breached, but it's not often covered in the West.
A2SV - Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed A2SV – Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed
A2SV is a Python-based SSL Vulnerability focused tool that allows for auto-scanning and detection of the common and well-known SSL Vulnerabilities.
VHostScan - Virtual Host Scanner With Alias & Catch-All Detection VHostScan – Virtual Host Scanner With Alias & Catch-All Detection
VHostScan is a Python-based virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
Equifax Hack Blamed On Single Employee Equifax Hack Blamed On Single Employee
We wrote about the Equifax Hack, Data Breach and Leak last month, which happened due to a flaw in Apache Struts that for some reason hadn't been patched.
LOIC Hivemind - Low Orbit Ion Cannon LOIC Download – Low Orbit Ion Cannon DDoS Booter
LOIC Download below - Low Orbit Ion Cannon is an Open Source Stress Testing and Denial of Service (DoS or DDoS) attack application written in C#.


3 Responses to Telegram DDoS Attack – Messaging App Suffers 200GBps Pounding

  1. Roman July 16, 2015 at 4:20 am #

    Telegram is considered to be “safe” from peeking by governments and other 3rd parties. East Asia – probably North Korea or China wanted to prevent their citizens at least temporarily from using the messaging service.

  2. moemon xi July 16, 2015 at 5:46 pm #

    Are there still people using Telegram?! All of my contacts have switched to Threema by now.

    • Darknet July 16, 2015 at 7:39 pm #

      Not sure where you’re from, but yah, it’s still pretty huge in Asia. And from my observations, the people using it don’t even know/care it’s security/privacy oriented. It’s just another WhatsApp to them.