Edit 5:
It's not over, they haven't given up entirely. I took down this sticky a few hours ago thinking that it was old news, but Voat is still being probed and attacked so I am putting this sticky back up.
Edit 4:
As many of you know already Voat is still being attacked, but in many different ways. We now believe this is related to Voat not taking down material without a court order.
Edit 3:
We are still being sent high amounts of traffic. For the time being let's just be happy we have remained online throughout this assault. Sorry about the thumbnails (text only Voat is so 1990s).
Top Traffic Last 24 Hours
DDOS Inflow
Edit 2:
This attack is relentless and dynamic. They have found holes in our system and hit us where we never expected. This has forced us to reconfigure our network and site behavior to prevent repeat attacks.
Voat has been put into "lockdown" mode so things like thumbnail generation are disabled.
Edit:
These guys are actually fairly creative. We might have a worthy opponent here. Buckle up Voat.
One of the reasons yesterday's attempt at rolling forward the port code failed was that Voat was being sent DDOS style requests in very large numbers. See yesterdays announcement about this topic.
Voat is at a stage now that the code can somewhat deal with this without capitulating. Usually these attacks only last 10-12 hours, but this current run has been longer in duration than normal so we are now informing the community that we are actually being maliciously targeted.
Below are some interesting graphs showing some stat data:
Top traffic sources in Last 24 hours
Requests over last 30 days
CPU drop when CF DDOS Protection turned on
I'll provide more info when we have it, but PG.
Until then, enjoy having your bits closely inspected. Please don't be shy about it either, just go with it. This includes the ladies as well... ;)
https://voat.co/v/announcements/1330806
view the rest of the comments →
bourbonexpert ago
I don’t know anything about this type of stuff.
What is happening exactly?
Also, why would someone attack us. Just for lulz?
sheepsexplode ago
Denying legit requests for the site by drounding the site with fake ones.
Like hacking with a hammer.
When you go to voat your request for that page gets lost in the mass of fake requests and will get missed.
Thus denying you the service.
bourbonexpert ago
so do these hackers ddos people have a thousand computers all clicking at the same time?
is it a program on one cputer that autoclicks?
sheepsexplode ago
Both.
Normally a spyware installation lays dormant until the coder sends it a target.
Once all the victim computers are infiltrated you have a bot net. Each one dose send tons of clicks.
Reddit_traitor ago
they can take over computers all over to do the attack. they are called botnets.
bourbonexpert ago
hmmm...that seems like a colossal waste of time. lol
weeds-in-the-garden ago
You're thinking to limited.
1.) How much money could you make by having a service to take out web pages?
2.) How much money could you make if you had an almost unlimited amount of storage?
3.) How much money could you make by slaving out thousands of machines and use their idle process time and run cryptocurrency miners?
4.) How much money could you make by drowning the web in ads?
Those are classic business models for hackers. I'm sure many more have come up. There are so many examples of making money by taking over peoples machines. And, all of that is without being real malicious and running key loggers and file scanners.