Tor network attacked by a wave of DDoS attacks. The platform and service have had attacks ongoing for several months.
Tor Network Attacked By a Wave of DDoS Attacks
In a blog post by the company, Isabela Dias Fernandes, Tor project executive director said that the attacks would sometime be so serious that users would experience slow page loads, or even in more extreme experiences and cases, the pages on the platform wouldn’t even load at all.
The project’s engineers are “working hard” to curb the issue, she added, but however, also stated that the methods and targets used by the attackers change over time thus facing the project to adapt as the attacks on the platform continue.
Tor Network Has Not Been Able To Identify the Threat Actors
So far, no one has stepped forward to claim responsibility for the attacks, and Tor was unable to determine the attackers’ identities or motives. “We will continue to increase and tweak defenses on the Tor network to combat this problem,” she concluded.
And while Tor might have not been able to identify the people or person behind the attacks, users however suspect nation-states might have something to do with it, mostly due to the fact that another project that is similar has been experiencing similar aggravating circumstances.
Tor Network Has Been Under Some Heavy DDoS Attacks for Three Days Running
BleepingComputer has also reported that the peer-to-peer network Invisible Internet Project (12P) also has been under some heavy DDoS attacks, for at least three days running. The attacks reportedly forced a couple of i2pd routers to crash with out-of-memory errors thus rendering the service poor or totally unusable to many users.
Content of the Project in a Reddit Thread Announced
“As you already know, the I2P network has been targeted by a Denial-of-Service attack for the past ~3 days. The attacker is flooding the network with malicious floodfill routers, which are responding incorrectly or not at all to other routers and feeding the false network information,” the project stated in a Reddit thread announced.
“This results in performance and connectivity problems, because the floodfills provide peer information to the participants in the network. The result is a form of sybil attack which is used to cause widespread denial of service. This attack has degraded the performance of the network but it remains intact and usable. Java I2P routers still appear to be handling the issues better than i2pd routers. Various mitigations should appear in dev builds of both Java and C++ routers in the next week.”