DDoS hacking PSTARS, PARTY POKER & ACR

VisionNutz

VisionNutz

Rock Star
I want to share some light on an article I was reading here at





Extortion central to most DDoS attacks

Modern DDoS attacks typically employ tens or hundreds of thousands of “zombie” computers — virus-laden devices scattered around the globe — that are commanded in harmony to send data requests to the targeted site to slow traffic to a crawl and make it useless for gambling-business activities. The “DDoS” moniker is commonly used to label several different forms of traffic-based online attacks designed to cripple the target site’s activity.
DDoS attacks have been an intermittent but occasionally recurring threat that has existed since online gambling’s earliest days. Similar attacks have targeted other forms of online commerce as well. Extortion, in the form of a promise to halt the attacks when the target pays a ransom to the attacker or attackers, is the most common motive behind the attacks.
One twist frequently seen in recent years is a demand by the blackmailers that payments be made in hard-to-trace cryptocurrencies such as Bitcoin. Whether a site victimized by an attack has made such a payment is virtually never disclosed in public, especially by publicly-traded firms. Most websites and networks impacted by such attacks incur heavy losses due to downtime and increased customer-service cost, but would rather incur that form of operating expense rather than give in to any kind of blackmail.



Not all players were impacted. Players from PokerStars’ smaller locally licensed countries—including Belgium, Bulgaria, Czech Republic and Romania—were seemingly unaffected; players from these countries were able to chip up from the disconnected players.
PokerStars tried to mitigate the issue by pausing all the running tournaments, but this came almost an hour after the disconnections started. This allowed unaffected players to build up a chip lead by “blind-stealing” from the disconnected players.







Also PARTY POKER & POKERSTARS did an amazing job to get control of the situation so I think we should be very appreciative to have such competent team of security working on the issue. I was affected and they have been very communicative and helpful!:p



:party:
 
VisionNutz

VisionNutz

Rock Star
I want to share some light on an article I was reading here at






Extortion central to most DDoS attacks

Modern DDoS attacks typically employ tens or hundreds of thousands of “zombie” computers — virus-laden devices scattered around the globe — that are commanded in harmony to send data requests to the targeted site to slow traffic to a crawl and make it useless for gambling-business activities. The “DDoS” moniker is commonly used to label several different forms of traffic-based online attacks designed to cripple the target site’s activity.
DDoS attacks have been an intermittent but occasionally recurring threat that has existed since online gambling’s earliest days. Similar attacks have targeted other forms of online commerce as well. Extortion, in the form of a promise to halt the attacks when the target pays a ransom to the attacker or attackers, is the most common motive behind the attacks.
One twist frequently seen in recent years is a demand by the blackmailers that payments be made in hard-to-trace cryptocurrencies such as Bitcoin. Whether a site victimized by an attack has made such a payment is virtually never disclosed in public, especially by publicly-traded firms. Most websites and networks impacted by such attacks incur heavy losses due to downtime and increased customer-service cost, but would rather incur that form of operating expense rather than give in to any kind of blackmail.




Not all players were impacted. Players from PokerStars’ smaller locally licensed countries—including Belgium, Bulgaria, Czech Republic and Romania—were seemingly unaffected; players from these countries were able to chip up from the disconnected players.
PokerStars tried to mitigate the issue by pausing all the running tournaments, but this came almost an hour after the disconnections started. This allowed unaffected players to build up a chip lead by “blind-stealing” from the disconnected players.









Also PARTY POKER & POKERSTARS did an amazing job to get control of the situation so I think we should be very appreciative to have such competent team of security working on the issue. I was affected and they have been very communicative and helpful!:p



:party:



FASTER RESPONSE TIME IS NEEDED
 
Party Guides: Dansk - Deutsch - Français - Svenska - Nederlands - Español - Partycasino Bonus Code - Polski - Português - Norsk - Suomi - PartyPoker NJ - PartyPoker Mobile - Party Casino - Deutsch Bonus Code PokerStars Reviews: Français, Nederlands, Deutsch, Dansk, Italiano, Español, Polski, Norsk, Português, Svenska - PokerStars Mobile - Deutsch Mobile - PS Casino
Top