KaktusMedia inaccessible in Tajikistan. Kyrgyz news websites reportedly undergoing a DDoS attack

Asia-Plus

Kyrgyz news website KaktusMedia is currently inaccessible in Tajikistan.  Kyrgyz news websites are reportedly experiencing a distributed denial of service (DDoS) attack in connection with reports about Raiymbek Matraimov. 

Due to a DDoS attack, some Kyrgyz news websites are currently functioning intermittently while others are inaccessible outside Kyrgyzstan. 

Thus, KaktusMedia is functioning intermittently and is not accessible in the territory of Tajikistan.  

“Unfortunately, we have technical problems, experiencing a DDoS attack.  In order to protect and preserve the website at least in the territory of Kyrgyzstan, we have temporarily restricted access.  But we are solving this problem and hope our website will be available again outside our country, including in Tajikistan,” representative of Kaktus-Media told Asia-Plus.   

Kloop.kg on December 17 reported an unprecedented DDoS attack on Kyrgyz media outlets that reproduced Factcheck.kg report about the Matraimov family.  

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.  DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.  Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.  

A DDoS attack requires an attacker to gain control of a network of online machines in order to carry out an attack.  Computers and other machines (such as IoT devices) are infected with malware, turning each one into a bot (or zombie). The attacker then has remote control over the group of bots, which is called a botnet.

Once a botnet has been established, the attacker is able to direct the machines by sending updated instructions to each bot via a method of remote control.  When the IP address of a victim is targeted by the botnet, each bot will respond by sending requests to the target, potentially causing the targeted server or network to overflow capacity, resulting in a denial-of-service to normal traffic.  Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.  

 

Article translations:

Related Articles

spot_imgspot_img

Most Read

Join us on social media!

Реклама на asia +spot_imgspot_img

Recent Articles

Navruz, Wrestling, and Cars: How the Pahlavon from Rogun Conquered the Gushtingiri Tournament in Dushanbe

Subkhiddin Khalilzoda won the final of the gushingiri in Dushanbe and became the hero of the spring holiday.

Navrouz greetings

Dear readers and subscribers! Asia-Plus News Agency congratulates you...

Eid al-Fitr greetings

Dear readers and subscribers, Eid Mubarak! May this blessed...

Russian ruble weakens against the Tajik national currency and major global currencies

In recent weeks, the Russian ruble has experienced a...

Over 2,500 participants expected at Water Conference in Dushanbe

The Fourth High-Level International Conference on the International Decade...

BARQ becomes new IT Park Dushanbe resident, launches power bank rental service

A common problem for many city dwellers: a dead...

Some bazaars and shopping centers in Dushanbe to close for up to four days during Navrouz celebrations

During the Navrouz holiday celebrations, some bazaars and shopping...

Eurasian Development Bank Predicts 8.1% Economic Growth for Tajikistan in 2026

Analysts from the Eurasian Development Bank (EDB) forecast a...

Iran’s intelligence minister killed in air strike

Iranian President Masoud Pezeshkian confirmed the death of intelligence...

Russian parliament tightens immigration rules for migrant children and patent holders

On March 18, the State Duma (Russia’s lower chamber...