Dogedigital
Legendary
Offline
Activity: 1330
Merit: 1000
|
|
October 20, 2016, 07:08:55 PM |
|
Was the DDOS attack similar to this e-mail?
IMPORTANT! Redirect this e-mail to your CEO/CFO/any kind of such person Hello, Your website is under DDoS attack by us since 18:22 PM (YOUR TIME) This attack will continue for 1 hour to prove that we are serious. After the 1 hour DDoS attack is finished, we give you 6 hours to send 5 BTC to: 1Az7TzV7vD5etpJNz1h9JV6NzCBjyzgaez If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there's no counter measure to this. You will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst Google and your customers and make sure your website will remain offline until you pay. Please do not attempt to negotiate with us because you will simply be ignored and the attacks will continue. We expect to receive this WITHIN 6 hours. If we do not receive 5 BTC within 6 hours, all of your services will suffer from even larger DDoS attacks and we will continue the attacks until you decide to pay. If you do not pay within 6 hours, the price for us to stop will also increase to 7.5BTC. We will then give you 12 hours to pay the 7.5BTC. If you do not, the price will be increased to 10BTC. Every 12 hours that you do not pay, 2.5BTC will be added up to the amount. Once the BTC is received and confirmed by us, we will leave you alone. We do bad things but we do keep our promises. NOTE: We have enough resources to continuously attack your services and we will destroy any mitigation service put in place. NOTE2: You do not have to reply to these emails (so nobody knows you co-operated with ransom) - we will see what you decide to do based on if we receive the BTC or not. Regards, ONICPtr
|
|
|
|
Randian Hero
|
|
October 20, 2016, 10:52:39 PM |
|
We are under DDoS again, and are doing maintenance on one server to make it more resilient. We never answered to any DDoS threats and never will.
|
|
|
|
retrocoingames
|
|
October 21, 2016, 02:02:54 AM |
|
Was the DDOS attack similar to this e-mail?
IMPORTANT! Redirect this e-mail to your CEO/CFO/any kind of such person Hello, Your website is under DDoS attack by us since 18:22 PM (YOUR TIME) This attack will continue for 1 hour to prove that we are serious. After the 1 hour DDoS attack is finished, we give you 6 hours to send 5 BTC to: 1Az7TzV7vD5etpJNz1h9JV6NzCBjyzgaez If you decide not to pay, we will start the attack at the indicated date and uphold it until you do, there's no counter measure to this. You will only end up wasting more money trying to find a solution. We will completely destroy your reputation amongst Google and your customers and make sure your website will remain offline until you pay. Please do not attempt to negotiate with us because you will simply be ignored and the attacks will continue. We expect to receive this WITHIN 6 hours. If we do not receive 5 BTC within 6 hours, all of your services will suffer from even larger DDoS attacks and we will continue the attacks until you decide to pay. If you do not pay within 6 hours, the price for us to stop will also increase to 7.5BTC. We will then give you 12 hours to pay the 7.5BTC. If you do not, the price will be increased to 10BTC. Every 12 hours that you do not pay, 2.5BTC will be added up to the amount. Once the BTC is received and confirmed by us, we will leave you alone. We do bad things but we do keep our promises. NOTE: We have enough resources to continuously attack your services and we will destroy any mitigation service put in place. NOTE2: You do not have to reply to these emails (so nobody knows you co-operated with ransom) - we will see what you decide to do based on if we receive the BTC or not. Regards, ONICPtr
wow that is brutal - reminds me of the old DD4BC hacker
|
|
|
|
ioncornel78
Newbie
Offline
Activity: 36
Merit: 0
|
|
October 21, 2016, 06:13:31 AM |
|
From several months, still slow answers from api in win case ! Please recheck the filters because some users don't have this issue !
|
|
|
|
crazyivan
Legendary
Offline
Activity: 1652
Merit: 1007
DMD Diamond Making Money 4+ years! Join us!
|
|
October 21, 2016, 06:29:02 AM |
|
Well, if you do reply to this ransom request, you know what s going to happen. They ll come back asking for more. Damn, I have also considered crypto to be a beautiful industry, really dislike seeing these issues.
|
|
|
|
|
Randian Hero
|
|
October 21, 2016, 01:06:29 PM |
|
We have now patched the system so it's no longer vulnerable to the ongoing DDoS. All systems are go.
|
|
|
|
ioncornel78
Newbie
Offline
Activity: 36
Merit: 0
|
|
October 21, 2016, 03:38:00 PM |
|
We have now patched the system so it's no longer vulnerable to the ongoing DDoS. All systems are go.
When u fix delayed response for win case in api ?
|
|
|
|
RedGolpe
|
|
October 21, 2016, 07:04:10 PM |
|
It looks like the DDoSers are back, now the site replies with a 504.
|
|
|
|
lite
Legendary
Offline
Activity: 1400
Merit: 1009
|
|
October 21, 2016, 07:39:26 PM |
|
It looks like the DDoSers are back, now the site replies with a 504.
I don't see such an error, i'm able to open satoshidice without any errors. it's just loading slow for me atm.
|
|
|
|
starmman
Legendary
Offline
Activity: 1484
Merit: 1029
|
|
October 21, 2016, 08:35:46 PM |
|
It looks like the DDoSers are back, now the site replies with a 504.
I don't see such an error, i'm able to open satoshidice without any errors. it's just loading slow for me atm. Thats the nature of a DDoS, its a transient fault - it may work for some but not for others depending where you are in the world and how much pressure the attackers are applying from the servers. From where I am the site is completely offline. I suspect it will be back soon, I'm not worried about any funds on the site as this happens every now and then in this industry - in fact - even to Bitcoin talk quite often.
|
|
|
|
Randian Hero
|
|
October 21, 2016, 10:11:30 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
|
|
|
|
starmman
Legendary
Offline
Activity: 1484
Merit: 1029
|
|
October 22, 2016, 07:52:31 AM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Good to hear - sounds like its a very persistent attack. I hope that they are not trying to bribe SD to get back online. If you don't give in to them and adapt to the threats quickly enough hopefully they will eventually get bored and move onto a weaker target.
|
|
|
|
adaseb
Legendary
Offline
Activity: 3878
Merit: 1733
|
|
October 22, 2016, 12:34:31 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Yeah pretty much the entire internet is under DDOS today. Many huge websites like Facebook, Twitter, CNN all got DDOS because the DNS provider got DDOS.
|
|
|
|
Randian Hero
|
|
October 22, 2016, 02:45:40 PM |
|
Update: The DDoS persists. We are still working on a solution for this.
|
|
|
|
BTCevo
Legendary
Offline
Activity: 1834
Merit: 1008
|
|
October 22, 2016, 03:32:07 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Good to hear - sounds like its a very persistent attack. I hope that they are not trying to bribe SD to get back online. If you don't give in to them and adapt to the threats quickly enough hopefully they will eventually get bored and move onto a weaker target. Dont know if this bribe is true or not but let say it is true, your site will be get ddos attacked from them and this will take some time to recover from it though. And btw what do you mean by weaker target? Dont you think moneypot is weaker? What do they get from weaker target? Nothing i suppose, better to hit on some huge site with good traffic so there will be possibility they will pay the ransom
|
|
|
|
starmman
Legendary
Offline
Activity: 1484
Merit: 1029
|
|
October 22, 2016, 03:40:53 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Good to hear - sounds like its a very persistent attack. I hope that they are not trying to bribe SD to get back online. If you don't give in to them and adapt to the threats quickly enough hopefully they will eventually get bored and move onto a weaker target. Dont know if this bribe is true or not but let say it is true, your site will be get ddos attacked from them and this will take some time to recover from it though. And btw what do you mean by weaker target? Dont you think moneypot is weaker? What do they get from weaker target? Nothing i suppose, better to hit on some huge site with good traffic so there will be possibility they will pay the ransom I meant a target which is more likely to pay than a smaller site. Depends upon how tech savvy the target is. For example a large retail site which doesn't specialise in tech / or a site that has weak hosts and no way of defending against a DDoS will be more likely to pay.
|
|
|
|
ioncornel78
Newbie
Offline
Activity: 36
Merit: 0
|
|
October 22, 2016, 04:47:29 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Good to hear - sounds like its a very persistent attack. I hope that they are not trying to bribe SD to get back online. If you don't give in to them and adapt to the threats quickly enough hopefully they will eventually get bored and move onto a weaker target. Dont know if this bribe is true or not but let say it is true, your site will be get ddos attacked from them and this will take some time to recover from it though. And btw what do you mean by weaker target? Dont you think moneypot is weaker? What do they get from weaker target? Nothing i suppose, better to hit on some huge site with good traffic so there will be possibility they will pay the ransom I meant a target which is more likely to pay than a smaller site. Depends upon how tech savvy the target is. For example a large retail site which doesn't specialise in tech / or a site that has weak hosts and no way of defending against a DDoS will be more likely to pay. Nobody should never pay this kind of ransom, because they will be encouraged to do this again and again... Just use better filters to avoid DDOS attack
|
|
|
|
andulolika
Legendary
Offline
Activity: 2324
Merit: 1047
|
|
October 22, 2016, 06:31:19 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Good to hear - sounds like its a very persistent attack. I hope that they are not trying to bribe SD to get back online. If you don't give in to them and adapt to the threats quickly enough hopefully they will eventually get bored and move onto a weaker target. Dont know if this bribe is true or not but let say it is true, your site will be get ddos attacked from them and this will take some time to recover from it though. And btw what do you mean by weaker target? Dont you think moneypot is weaker? What do they get from weaker target? Nothing i suppose, better to hit on some huge site with good traffic so there will be possibility they will pay the ransom I meant a target which is more likely to pay than a smaller site. Depends upon how tech savvy the target is. For example a large retail site which doesn't specialise in tech / or a site that has weak hosts and no way of defending against a DDoS will be more likely to pay. Nobody should never pay this kind of ransom, because they will be encouraged to do this again and again... Just use better filters to avoid DDOS attack I agree with you, I had ransomware on my pc once and in that moment it seemed really hard to lose all that info, mostly because pictures but didn't fill those cunts atleast.
|
|
|
|
lite
Legendary
Offline
Activity: 1400
Merit: 1009
|
|
October 22, 2016, 06:43:35 PM |
|
A modified version of the DDoSing persists. We are developing a solution to this.
Good to hear - sounds like its a very persistent attack. I hope that they are not trying to bribe SD to get back online. If you don't give in to them and adapt to the threats quickly enough hopefully they will eventually get bored and move onto a weaker target. Dont know if this bribe is true or not but let say it is true, your site will be get ddos attacked from them and this will take some time to recover from it though. And btw what do you mean by weaker target? Dont you think moneypot is weaker? What do they get from weaker target? Nothing i suppose, better to hit on some huge site with good traffic so there will be possibility they will pay the ransom I meant a target which is more likely to pay than a smaller site. Depends upon how tech savvy the target is. For example a large retail site which doesn't specialise in tech / or a site that has weak hosts and no way of defending against a DDoS will be more likely to pay. Nobody should never pay this kind of ransom, because they will be encouraged to do this again and again... Just use better filters to avoid DDOS attack That's true man, if the extortionist will get paid what they asked for then they'll definitely try to extort it again. it's better to just upgrade the security.
|
|
|
|
|