LIZARD SQUAD is Back. Planning XBL Attack. "Biggest attack yet". [UP: XBL/PSN Down]

Yup. China is currently the largest culprit here, having millions of infected PCs. South Korea comes in a close second, due to their superfast internet and "cyber cafe" culture where cheap PCs are set up to be rented out to play games on, and they're usually quite infected.

MS should just cut of Chinese data transmission the second they see the rise in data traffic from China ;-)

Bad for the 3% Chinese xbox users but the other 97% of xbox users around the world would not see a problem.

But probably it will not be that easy :-)
 
Your PC would have to have no antivirus, firewall, or basic safeguards against infection. That's probably a tall order for an internet-aware poster on GAF.

The thing about malware is that it's a constant arms race. Even the best antivirus does nothing to protect the user against malware, since malware is just regular software, no viruses. It, technically, isn't doing anything an antivirus is worried about. But anti-malware software, like Malwarebytes, scans specifically for things like software that is doing something it's not supposed to - but each time Malwarebytes identifies and innoculates against one type of malware, a new strain arrives that doesn't set off any alarms.

You know those people who just click "next next next" when installing software from the internet, like say, a YouTube video downloader, etc - they're usually installing malware too, without realizing it. Toolbars for browsers, browser extensions, that all look harmless - but make your PC a part of a botnet.

So yeah, while GAF might not be a major contributor here, millions of random college kids, internet cafe users, around the world... does add up. And when OS creators try to help, by putting in things like UAC in Windows, people turn it off since the constant "do you want to run this?" messages annoy them.

Humans are the problem. :P
 
The thing about malware is that it's a constant arms race. Even the best antivirus does nothing to protect the user against malware, since malware is just regular software, no viruses. It, technically, isn't doing anything an antivirus is worried about. But anti-malware software, like Malwarebytes, scans specifically for things like software that is doing something it's not supposed to - but each time Malwarebytes identifies and innoculates against one type of malware, a new strain arrives that doesn't set off any alarms.

You know those people who just click "next next next" when installing software from the internet, like say, a YouTube video downloader, etc - they're usually installing malware too, without realizing it. Toolbars for browsers, browser extensions, that all look harmless - but make your PC a part of a botnet.

So yeah, while GAF might not be a major contributor here, millions of random college kids, internet cafe users, around the world... does add up.

Agreed. I'm just making the reasonable guess that (at the very least) people in this thread are on the up and up with regards to the personal security of their computer. No need for some to fear-monger by telling people to check their router or whatever.
 

I wonder if this will be the mistake they make.

They only have to trip up once to screw themselves over.

It's a waiting game really, it's too resource intensive to go full throttle after them because they aren't a threat, they are causing tremendous monetary damage and fucking up many peoples Christmas holidays, and I'm talking more about Engineers and such here more than gamers, but they aren't a threat to security currently so agencies aren't assigning a lot of resources to them, yet.

Eventually they will get too cocky and make a mistake and reveal themselves, or this will just catch up with them.

DDoS attacks can cost companies literally millions, it's not a laughing matter really.

Watching Norse is like watching fireworks today, insane.
 
Is this confirmed Lizardsquad again?

Lizard claims they've stopped, and are focused on something else (the Tor network). However the Norse darknet is still showing a *redonkulous* amount of attacks hitting the US right now, like, seriously. My browser can't even handle showing what is likely 2% of the actual scope of attacks.

klQSz9Z.png

So who knows what's going on by now - copycat groups might be using this time to just do some damage while they can, since everyone will think it's LS.
 
Went out and bought GTA V and Second Son because I had no games. Expected this to be resolved by now. Oh well, if the attacks are truly over and Sony and MS are fixing server, they should be up by tonight or later this afternoon. Until then, it's GTA and Giant Bomb GOTY for me. Kinda excited to see if these fuckers get caught.
 
According to a source of mine, the people responsible are despicable assholes.

Took a day off to enjoy the PS4, play some War Thunder, cash in on some PS+ funds.

Fail.
 
Lizard claims they've stopped, and are focused on something else (the Tor network). However the Norse darknet is still showing a *redonkulous* amount of attacks hitting the US right now, like, seriously. My browser can't even handle showing what is likely 2% of the actual scope of attacks. So who knows what's going on by now - copycat groups might be using this time to just do some damage while they can, since everyone will think it's LS.

Why would copycat groups attack when they'll get none of the attention?
 
Why would copycat groups attack when they'll get none of the attention?

This is conjecture, but - traditionally, large-scale DDoS attacks are used as a smokescreen to hide more malicious things, like *actual* hacking into secure places made unsecure due to their infrastructure being toppled. I wouldn't be surprised if a few groups are using yesterday's mess, and today's mess, to try and hit some payday by getting info or data they can sell. But I'm just guessing. Regardless, the two publicly-visible darknets that show DDoS activity are showing way higher than normal action, for whatever reason.
 
Lizard claims they've stopped, and are focused on something else (the Tor network). However the Norse darknet is still showing a *redonkulous* amount of attacks hitting the US right now, like, seriously. My browser can't even handle showing what is likely 2% of the actual scope of attacks.



So who knows what's going on by now - copycat groups might be using this time to just do some damage while they can, since everyone will think it's LS.
US is always getting hammered on that map :/ also it doesn't actually track real time attacks on other servers, it basically has servers all over the world that look like they have sensitive/useful/important data on them and then records traffic to/from those.
 
US is always getting hammered on that map :/ also it doesn't actually track real time attacks on other servers, it basically has servers all over the world that look like they have sensitive/useful/important data on them and then records traffic to/from those.

Yup, Norse and Arbor have their own darknets, or "network telescopes" as they're called, seeded with thousands of honeypots and general sensors on various IP ranges, which they use to get a kind of "snapshot" of data hitting wide on the internet. Like buoys out at sea that track the weather, acting as an early warning system for storms.
 
This is conjecture, but - traditionally, large-scale DDoS attacks are used as a smokescreen to hide more malicious things, like *actual* hacking into secure places made unsecure due to their infrastructure being toppled. I wouldn't be surprised if a few groups are using yesterday's mess, and today's mess, to try and hit some payday by getting info or data they can sell. But I'm just guessing. Regardless, the two publicly-visible darknets that show DDoS activity are showing way higher than normal action, for whatever reason.

great post.

DDOS attacks are usually used by actual hackers to monitor how an organization responds to the attack. overtime analytics will show trends. you can then use a DDOS attack to make everyone focus their resources to combat the DDOS attack, and letting their guard down in other areas.
 
You are right - and have a right to be angry. Sony does need better infrastructure, and might want to invest in a new or better DDoS mitigation partner. But it is simply impossible to outright prevent any kind of poor end-user experience when a DDoS of this size is aimed at a company's online assets. It's a problem with the entire way the internet works, sadly.

What is the actual size of the attack though? The idea that seems to be floating around right now on Gaf paints a group of sad outcast kids with no real hacking knowledge or skill playing with a botnet they barely understand. Or is it actually the fiercest and larger scale ddos attack ever carried out against an entertainment services provider? Cause it can hardly be both.
 
This is conjecture, but - traditionally, large-scale DDoS attacks are used as a smokescreen to hide more malicious things, like *actual* hacking into secure places made unsecure due to their infrastructure being toppled. I wouldn't be surprised if a few groups are using yesterday's mess, and today's mess, to try and hit some payday by getting info or data they can sell. But I'm just guessing. Regardless, the two publicly-visible darknets that show DDoS activity are showing way higher than normal action, for whatever reason.

Not really related but someone did hack my twitter (I barely ever use it) this morning and followed a bunch of gaming/Esports people on twitter.

I think it's actually more related to the adobe hack a year or two back though.
 
What is the actual size of the attack though? The idea that seems to be floating around right now on Gaf paints a group of sad outcast kids with no real hacking knowledge or skill playing with a botnet they barely understand. Or is it actually the fiercest and larger scale ddos attack ever carried out against an entertainment services provider? Cause it can hardly be both.

it can be neither, too.
 
This is just completely unacceptable now! Both Sony and Microsoft get taken down, no surprise that XBL is getting going again much faster than Sony. I do not own an XBone, but I do a 360, and I never experienced anything yesterday. Unlike PSN on my PS4. I own a PS3 and it's core service was back up late last night. The PSN Store isn't though. And here is south Missouri I still have nothing on my PS4. I could play something offline, but my experience is that when I earn a trophy offline it doesn't register even when online services are running and I get logged on. So I'm not wasting my time. I'll play some backlogged games on my 360. Sony needs to take a hard look at ways to prevent this sh!t from happening again. It happens every month or so. PSN should be CPSN (Can't Play Sh!t Network)!

Also the rumor that Sony is giving a "Welcome Back" package, 2 free games, better be true. And M$ should do the same. We deserve, NO! WE ARE ENTITLED TO THEM because of their incompetence to keep networks up through attacks. I used to work for an ISP and DDoS attacks went through are networks all the time. It is NOTHING to stop them even before they go through to their intended destination.

lol, such vigor.
 
What is the actual size of the attack though? The idea that seems to be floating around right now on Gaf paints a group of sad outcast kids with no real hacking knowledge or skill playing with a botnet they barely understand. Or is it actually the fiercest and larger scale ddos attack ever carried out against an entertainment services provider? Cause it can hardly be both.

Some sources put yesterday's attack at 400Gbps - which is only a baseline, since smurfing and amplification can make that number a whole lot bigger on the receiving end. A very large botnet, primarily situated in China, is doing the attacking.

The botnet is large, and was/is engaging in a pretty big DDoS against PSN and XBL, currently Tor. The question is, who told the botnet what to attack?

Anyone can buy access to a botnet if you know where to look, and the more you pay the more power you can buy into. So yes, if Lizardsquad really is instigating these attacks, it's likely they're just a bunch of individuals (or just one), who used stolen credit card information to buy botnet time, and cause a ruckus. Lizardsquad *could* be a legit hacking group that actually owns the large botnet we see in action right now, and are using these attacks to cover for more malicious hacking actions, but there is no way of really knowing.

So I guess it depends on which one you think is more likely. There's also a good chance this is just another 4chan lulzsec/anon action to stir the pot a little.
 
LizSquad are just Anonymous wannabees. I hope they all die or better yet get rapped in prison everyday for the rest of their lives.

Bit harsh brah. You should probably find another hobby for a while if gaming offline makes you think like that. I'm not thrilled but I don't wish harm.
 
Shit, this is what I get for breaking my rules and buying digital games on ps4 : P
I can't play Ground Zeroes since it can't reach the server. I forgot this was going on untilo I just tried to play it. I wish it didn't have to check the license every single time. Once It's confirmed on my ps4, it needs to stay. Even if I can't use online features, I feel like it should remember and let my play single player anyways.
 
I thought Kim dotcom made a deal with these guys so they'd stop? But both xbl and psn are still having problems. What gives?
Nothing you read is real anymore, there's a lot of misinformation being thrown around.

Good. Stop providing a stage for these idiots to play their games on.
All of us using their name and the media using their name - as if that helps anymore than "hacker group"- isn't helping either, we're talking about them which is something I'm sure they're enjoying. I prefer just "the assholes who shutdown PSN".
 
PSN is definitely working for PS3. I can access the playstation store also. Still waiting on PSN for PS4 since I can't purchase the ps4 version of Guilty Gear Xrd from my ps3. lame
 
US attacks only? But, come on, all the PSN servers can't all be in the US right? Looking at that map, Scandinavia (where i live), is unscathed and PSN is still down over here. But hey, why put servers in Scandinavia...
 
Where is Obama on this? I mean he commented on The Interview hack surely this is worth his time too!

That was a hack that caused a metric fuckton of personal information, including social security numbers and executive-level emails, to be released to the public. The blame was placed on another nation, so it became a political and international incident.

This, is a DDoS attack, which while bad, is not quite in the same league. Though perhaps it should be considered as serious, though that would mean Obama would have to give a statement on this not being military action from China?

US attacks only? But, come on, all the PSN servers can't all be in the US right? Looking at that map, Scandinavia (where i live), is unscathed and PSN is still down over here. But hey, why put servers in Scandinavia...

This is a compound problem. While the DDoS attacks did do damage, even after they end there will be some lasting effects, and on top of that, the flood of Christmas consoles coming online with people trying to create accounts and sign in (which is like an unintentional DDoS). Why you might be having issues in Scandinavia might not be because of the servers in the actual region, but due to how those servers need to interact with the overall European PSN infrastructure. It's hard to say for sure, since we aren't privy to the complete picture with how Sony manages PSN.
 
Top Bottom