{"id":3944,"date":"2015-07-16T03:44:59","date_gmt":"2015-07-15T19:44:59","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3944"},"modified":"2015-09-09T19:36:35","modified_gmt":"2015-09-09T11:36:35","slug":"telegram-ddos-attack-messaging-app-suffers-200gbps-pounding","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/07\/telegram-ddos-attack-messaging-app-suffers-200gbps-pounding\/","title":{"rendered":"Telegram DDoS Attack – Messaging App Suffers 200GBps Pounding"},"content":{"rendered":"

For those not familiar before we get to the Telegram DDoS attack, Telegram is an instant messaging system focusing on privacy and multi-platform availability. It was launched by the founders of VK, the largest social network in Russia and is run as an independent non-profit company in Germany.<\/p>\n

The client code is open-source and audited and various implementations can be found by various individuals based on the API.<\/p>\n

\"Telegram<\/p>\n

Just a few days ago, users in South East Asia were having difficulty accessing the service and Telegram announced they were suffering a huge DDoS attack.<\/p>\n

Popular messaging platform Telegram has been hit with a 200Gbps distributed denial of service (DDoS) attack.<\/p>\n

The Tsunami TCP SYN flood kicked off on Friday and hurt users in Asia, Australia, and Oceania, knocking out the service for some five percent of the company’s 60 million active users it has gained in 18 months.<\/p>\n

It is a new form of DDoS attack discovered October by Radware security folk who say it is different from regular SYN floods in that it transmits large 100 byte packet sizes about double the regular 40 to 60 byte size.<\/p>\n

That Radware says defeats many defense algorithms and quickly consumes bandwidth making even a modest attack clock some four to five gigabits per second.<\/p><\/blockquote>\n