Hacker DDoS different markets currently

There is a small team of hackers currently DDoS Trade Route market as well as the Dream Market forums.

They used the software to DDoS the targeted URLs just now they tried it on DM for a short while before turning it to its forums.

TR should upgrade its protection against this conventional DDoS software.


Comments


[15 Points] allismokeisls:

Bitch ass niggas, thats the reason i cant fucking load the market. Little fucking pricks.


[11 Points] HardC0r3:

They are also DDoSing Tochka. Looks like many markets dont have the ideal infrastructure to handle this.

Hope they will improve that for the future.


[12 Points] downvote-hide-moveon:

I wonder, script kiddies or LE


[9 Points] kingburrito666:

I really wouldn't mind a DDOS protection captcha for the extra security.


[7 Points] DeadWifeHappyLife:

Markets get DDoS before getting taken down..


[5 Points] SpeedflyChris:

The issue with DDOS attacks on hidden services is that if the attacker also owns enough nodes in the TOR network they can correlate traffic from the DDOS and use it to reveal the ip of hidden services.


[2 Points] VagineConnoisseur:

hackers don't ddos, sorry.

the term you are looking for is packet kiddie.. probably bought his botnet from the markets too, lel.


[1 Points] TradeRouteModerator:

/r/TradeRoute/comments/739dcn/a_message_from_the_admins_concerning_the_ddos/


[1 Points] kali-linux:

has this coordinated attack happened recently before now?

How long does do they usually DDoS the sites for?


[1 Points] Danny-Fuckin-Dyer:

what bunch of arsehats :)


[0 Points] MyTrapAccount:

These fucking nerds with these DDoS attacks, I just want my drugs.


[0 Points] _PrinterPam_:

And how to you propose that they "upgrade" their protection? Can some kernel options (namely max concurrent half-open connections) be tweaked and the kernel rebuilt? Yes. Can certain PHP/SQL routines be optimized? Yes. Can certain fixed code be cached and served through reverse proxies to reduce computational complexity on the server? Sure...to an extent. Do any/all of these (and a lot more) protect against every type of DDoS technique out there? Not even remotely. Hidden Services, while having a boon in that most zombie machines in a botnet must also possess a Tor client in order to hit hidden services, have the bane of not being able to make use of the massive 'workaroundability' of clearnet routing protocols.

Sometimes you just have to wait shit out. Saying they should 'upgrade their DDoS' protection is akin to saying "we should fix climate change" or "fix hunger/homelessness."


[0 Points] ecstasais:

Tor is pretty vulnerable to DDoS, and there's an interesting fact: If on regular clearnet you have to get a lot of bots and fast connections, then on Tor it's the other way around.

http://www.hackingarticles.in/tors-hammer-slow-post-denial-of-service-testing-tool/

Web site owners can wipe their arse the cacha or any other conentional protection schemes. And, since we're dealing with Tor, all attacks seem to originate from one and the same single IP (obviously), so banning (or even distinguishing attackers from the regular customers) would be extremely difficult... I personally imagine that to selectively block incoming connections one has to look really deep into IP-packets and figure out a signature to stop and filter them on lowest level possible, or - as a bad option - block everybody.