Skip to main content

OKEx & Bitfinex Experience DDoS Attacks

OKEx and Bitfinex have suffered DDoS attacks in a short time frame. Distributed denial-of-service (DDoS) attacks are malicious attempts at disrupting normal traffic of targeted service and a major concern in internet security today.

While being more effective at defending themselves and resolving the issues caused by DDoS attacks, tech giants are no exception and still face these threats.

how does a ddos attack work?

OKEx, a top of the line cryptocurrency exchange and advanced financial service provider, made an announcement on Weibo, stating that they had been targeted for a DDoS attack last night.

However, their support team was able to detect the attacks early on and resolve the issues rather quickly, assuring that no clients had been affected by the attack.

While the exact source of the attack is unknown, OKEx believes it to be an attack orchestrated by a competitor. Jay Hao, CEO of OKEx, commented on the subject by saying that the products and technologies of their competitors could not compete with OKEx and bough a DDoS attack as a result.

Furthermore, Jay Hao goes on to mention that OKEx’s technology department is always on alert, 24 hours a day, and completes the anti-D traffic switching in a matter of minutes.

Jay Hao then goes on to say that it’s easy to trace the source of the large traffics created by DDoS attacks, further hinting at it being done by one of their competitors.

It’s worth mentioning that OKEx themselves have been accused in the past of arranging a similar attack in the form of wash trading on the platform of Blockchain Transparency Institute (BTI).

Wash trading is a process where a trader buys and sells a security for the purpose of feeding misleading information to the market and is illegal in certain countries.

Comments

Popular posts from this blog

Cloud-based DDoS Protection

Don’t let the DDoS attack interrupt your business operation for reputational and financial loss. Use cloud-based denial of service protection to prevent getting hacked. Denial-of-service attack definition Anyone with bad intentions can hire a hacking service for a targeted attack. Malware tools are accessible, easy to use, and effective. Not just large companies, but cybercriminals are looking for any size vulnerable victims, including personal blogs, e-commerce shops, small to medium businesses. One type of attack is particularly dangerous and increasingly common. It is called distributed denial of service attack, or DDoS for short. In a DDoS attack, a set of compromised, distributed systems –could be servers, home computers, Internet-of-Things devices, anything connected to the internet– is used to overwhelm a targeted system with a flood of requests, to the point in which the attacked system gets saturated enough to refuse to work. Since the flood comes from many scattered

What are the English proficiency levels?

 The classification used by language courses - basic, intermediate and advanced - is not exactly related to the levels of English proficiency that are based on the categorization of the European Common Framework or Framework. This guide considers the international standard ranking, which divides the degree of knowledge of the language into: See more:  Amazon Saheli Quiz Answers A1 (beginner) A2 (basic) B1 (intermediate) B2 (post-intermediate) C1 (advanced) C2 (proficient) Before you make any assessment, no matter how much you have prepared for it, pre-tests are recommended to find out where you would be classified if you took the test at that time. If your rating is below B2, in little or nothing a proficiency certificate will help you. Although many foreign universities consider the B1 level sufficient, the classes are already so complex even for those who have a perfect level of understanding of English, imagine for those who do not speak the language. Professionally speaking, below

What are the benefits of purchasing a SaaS model?

 Knowing what SaaS is and deploying this technology in your business will establish quite a differentiator . After all, companies that host their cloud services can increase the degree of efficiency applied to the processes, improving the results obtained.  So, do you want to know the other benefits that this service model provides? Just keep following this post! 1. More accurate software licensing costs Software licensing costs are often among the main factors that contribute to the weight of the IT sector in a company's budget. Therefore, reducing this expense (or making it more precise) is an objective that is part of the daily life of any IT manager. In this sense, SaaS is considered one of the best alternatives on the market. With SaaS, the company pays only for the number of active licenses. This dramatically eliminates spending on software licenses that are not in use. With this, the company can prepare itself in advance in case of projects or major structural changes. The s