Tuesday, December 8, 2015

Ukrainian hackers have spent DDos-attack site “Mail of Russia” – Commander

Website “Russian Post” has experienced hacker-style attack DDos: because the night cyberincidents access to federal site was hampered on Monday, 08: 00-13 : 00 (Moscow time). Computer specialists SOEs claim that the attack was successful only on an external circuit protection, and users’ personal data to hackers did not get. Press Service of the Federal State Unitary Enterprise “Russian Post” reported that the electronic services are functioning normally, despite the incident.

The site “Russian Post” at night was attacked by a hacker who organized DDos-incident – when a large number of infected computers to the target object sypyatsya requests. Naturally, the site can not withstand such overloads and crashes, said portal wordyou.ru. The night attack on the site of “PR” for hackers turned out to be very successful: the personal data of users before they reached, but could damage the outer protective kiberkontur web resource. After lunch, the work site is fully restored, and from 08:00 to 13:00, he worked with some failures.

According to the official statement of the press service of “Mail of Russia” during the hacker attack personal data lost It was not as effective protection showed outer contour of a new site. There is also clear that this attack by hackers in recent years is one of the most powerful attempts to frustrate the work of the resource. Meanwhile, now IT-specialists trying to identify the source of the attack, working on this issue with the relevant parts of the security forces. Moreover, there is every reason to believe that the site “Russian Post” can be re-subjected to DDos-attack.

Help: DDos-attack of this kind of influence by hackers on any Internet resource using a large number of computers, infected by a virus. In fact, here we are talking about uncontrolled number of different queries, which simply can not handle the resource and fails.

Found error in text? select it and click ctrl + enter

LikeTweet

No comments:

Post a Comment