DoSWatch = Aggregated stories about the use of denial of service attacks and hacking as a form of censorship.

If you hear about such an event, or if you've been censored in this way, please email or use @DoSWatch on Twitter.

This is not a news site. Our goal is to collect and quickly summarize, not research and fact-check. Many details of these reports rely on translated pages, speculation, and/or anecdote, so should be treated as such. Link quality will vary.

*click for email

Monday, May 10, 2010

RIAA - February 2004


DATE:
USA

AFFECTED COUNTRIES:
riaa.org

AFFECTED SITES:
Multiple outages each month between the 17th-22nd for several months.

EFFECT OF ATTACKS:
n/a

SOURCE COUNTRY:
n/a

ALLEGED ATTACKERS:
n/a

TYPE OF ATTACK:
DDoS

ATTACK SPECIFICS:
n/a

EVENT DESCRIPTION:
A strain of the MyDoom worm that uses infected computers to attack riaa.org (and Microsoft) between the 17th-22nd of each month. Months after the strain was discovered, the RIAA website was still going down every month (Microsoft easily fixed the problem).

URLS:
1. http://www.symantec.com/security_response/writeup.jsp?docid=2004-022011-2447-99
2. http://news.netcraft.com/archives/2004/06/17/riaa_site_still_battling_mydoomf.html
3. http://news.netcraft.com/archives/2004/03/24/riaa_site_intermittently_available_now_running_linux.html
4. http://news.netcraft.com/archives/2004/05/17/riaa_site_offline_again_on_mydoomf_trigger_date.html
5. http://news.netcraft.com/archives/2004/02/24/mydoomf_deletes_files_adds_riaa_to_ddos_targets.html


No comments:

Post a Comment

Archive