pwshub.com

Internet Archive wobbles back online

The Internet Archive has come back online, in slightly degraded mode, after repelling an October 9 DDoS attack and then succumbing to a raid on users' data.

For several days after the attack, the Archive loaded into the basic page depicted below.

Archive.org's distress homepage – Click to enlarge

At the time of writing (0400 Wednesday UTC, 2100 Tuesday PT), The Register has seen the site sometimes load that page, but sometimes load another that's closer to the Archive's usual busy home page – but omits many items.

It's unclear why the site is switching between the two (and yes, we cleared caches and used multiple browsers).

On October 13 the org's digital librarian, Brewster Kahle, advised that the Archive's services were "coming back up when they can, safely. e.g. Email working."

A day later, on the afternoon of October 14, Pacific Time, Kahle proclaimed the Wayback Machine – the service that preserves snapshots of web pages – was "running strong."

But he added: "Still working to bring archive items & other services online safely."

Network visibility outfit Netscout has shared its view of the incident, suggesting the DDoS ran for around three hours and twenty minutes and saw around five gigabits per second of traffic directed towards the site.

Netscout analysis of Internet Archive DDoS – Click to enlarge

Netscout's analysts watched that traffic target three IP addresses used by the Archive, and wrote "The DDoS attacks were mostly composed of two attack vectors: TCP RST floods and HTTPS application layer attacks."

  • 'Critical' CUPS vulnerability chain easy to use for massive DDoS attacks
  • Internet Archive blames 'environmental factors' for overnight outages
  • Elon Musk claims live Trump interview on X derailed by DDoS
  • FBI, CISA remind US voters that DDoS attacks can't touch election systems

The org also "discovered characteristics and shared open ports indicative of Mirai variants." Readers may recall that Mirai is nasty malware that subverts Linux-based devices and turns them into a botnet. Netscout asserted, with moderate confidence, that the attack came from "a modern Mirai variant … which incorporates packet-spoofing features."

For what it's worth, Akamai also recently spotted new Mirai variants.

Netscout also reckons much of the DDoS traffic involved "a well-known home entertainment and IoT product."

Most of the hosts spewing traffic at the Archive were devices "in Korea and China, followed by Brazil."

No actor has been named as driving the DDoS.

Kahle and the Archive have not yet detailed the incident, or any steps taken to harden the site against future heists. Fair enough – they've been busy getting back online. But the 31 million users whose data leaked – and the millions more users of the Archive – will likely be keen to know more before too much time passes. ®

Source: theregister.com

Related stories
1 month ago - The Internet Archive has lost its appeal after book publishers successfully sued to block the Open Libraries Project from lending digital scans of...
6 days ago - 31 million users' usernames, email addresses and salted-encrypted passwords are out there The Internet Archive had a bad day on the infosec front, after being DDoSed and exposing user data.…
5 days ago - 31M folks' usernames, email addresses, salted-encrypted passwords now out there The Internet Archive had a bad day on the infosec front, after being DDoSed and having had its user account data stolen in a security breach.…
1 month ago - Archivist Kay Savetz recovered 53 episodes of The Famous Computer Cafe (TFCC), a 1980s radio show about the emerging world of computers and technology that aired from 1983 to 1986. TFCC was broadcast by various radio stations in...
1 month ago - Judges representing the Second Circuit Court of Appeals have ruled that the Internet Archive's (IA) practice of lending digital copies of books without licensing fees is not fair use. The decision is a major victory for the publishers...
Other stories
13 minutes ago - Find out how to enhance efficiency using Google Security Operations Webinar  In an era of ever-evolving cyber threats, staying ahead of potential security risks is essential.…
42 minutes ago - Our tech columnist investigates how Meta’s Instagram, Facebook and Threads suppress content related to the election. Even discussing how to vote isn’t safe.
43 minutes ago - Call it a “shadowban” or “algorithmic suppression,” but companies are tight-lipped about what gets blocked from algorithmic feeds.
1 hour ago - Alkaline batteries are cheaper than lithium batteries and are great for simple electronics around your house. These options provide the best value.
2 hours ago - Article updated on October 15, 2024 at 11:52 PM PDT Our expert, award-winning staff selects the products we cover and rigorously researches and...