Tether Experience DDOS Attack ! Here’s The Outlook at What Really Happened! – Coinpedia – Fintech & Cryptocurreny News Media

Free Bitcoins: FreeBitcoin | BonusBitcoin

Coins Kaufen: Bitcoin.deAnycoinDirektCoinbaseCoinMama (mit Kreditkarte)Paxfull

Handelsplätze / Börsen: Bitcoin.de | KuCoinBinanceBitMexBitpandaeToro

Lending / Zinsen erhalten: Celsius NetworkCoinlend (Bot)

Cloud Mining: HashflareGenesis MiningIQ Mining

The most valuable stablecoin, USDT, has been the target of a distributed denial of service (DDOS) attack. This is according to a tweet from Paolo Ardoino, Tether’s chief technical officer (CTO). The company has reportedly been assaulted before, according to the tweet from June 18.

 “They tried it once,” said Ardoino.

According to the Tether executive, the attackers sent a ransomware demand on June 18’s morning. A large-scale DDOS was caused by the company’s refusal to comply with the demands.

“We often receive 2k requests per five minutes on a typical day. The attack increased our demand to 8M in 5 minutes.”

Mitigation of The Attack

The main ASN that Cloudflare recognises is AS-CHOOPA, Ardoino continued, which made it possible for the attack to be mitigated. He also made it clear that Tether sustained no losses as a result of the attack.

Austin Federa, the head of communications at Solana, inquired as to whether 8 million requests made in less than a minute constitute a DDOS attack. A jump from 20,000 to 80,000 should be seen as an attack, in Ardoino’s opinion.

The CTO commented on what the attackers wanted to gain given that it wouldn’t affect the USDT chain

Imagine a journalist visiting http://tether.to and encountering error 502 on the page. They will fly right away.: The Tether Site Is Not Working! Told You

Was this writing helpful?

Source link

Post Views:


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.