Bitcoin.org Briefly Shut Down by Denial of Service Attack; Bitcoin Not Affected

The website is home to Bitcoin Core, the most popular software version of bitcoin’s code. To be clear: Bitcoin’s blockchain itself was not attacked, only the website hosting one copy of its open-source code.

While the site was inaccessible, Bitcoiners disseminated the software to newcomers wanting to download the code via a torrenting service, an open-source marketplace for sharing data. Bitcoin Core’s client includes a “magnet link” (that random alphanumeric string in the below tweet) which can be manually shared to download Bitcoin Core from services like uTorrent and BitTorrent. From this link, the user can locate the hash for where Bitcoin Core is stored on these services and download the software.

Called “distributed denial of service,” a DDoS attack occurs when a person or group uses multiple devices to spam a server or system with data requests, clogging its bandwidth and typically rendering a website inaccessible.

Bitcoin.org is now live again. Cobra, a pseudonymous developer who helps maintain Bitcoin.org, told CoinDesk that DDoS attacks are not uncommon during hot price action and that this specific attack may not be over.

“Basically, we got hit with a large DDoS, which is quite common around ATHs (all-time highs) and bull markets. It took us down for a while but for now we’re back up, but  we might go down on and off periodically depending on how long the attackers want to continue attacking.”

Cobra told CoinDesk that the IP traffic from the attack is Russian, but it’s anybody’s guess where the attackers are actually located. That’s because, in addition to the attackers using privacy preserving tools like virtual networks, most attackers launch DDoS attacks remotely from malware-infested devices, pseudonymous and independent researcher 6102 told CoinDesk.

A DDoS against a distributed network like a blockchain–called a sybil attack–has never occurred on Bitcoin’s blockchain.

Leave a Reply

Your email address will not be published. Required fields are marked *