Hacking group Lizard Squad have taken credit for a distributed denial of service (DDoS) attack on Xbox Live that left tens of thousands of users unable to connect to the service.

The attack occurred on Monday and affected primarily North American users, who when attempting to sign inwere faced with a 80151909 error code.

Lizard Squad’s Twitter page later claimed responsibility and promised further attacks around Christmas.

“That’s a small dose of what’s to come on Christmas,” reads their account, which later added: “Sony had it worse.”

In August 2014, the group hacked the PlayStation Network, bringing down the Sony platform for nearly a whole day. They claim to have brought down online PC games such as World of Warcraft, Runescape, and League of Legends, and claim attacks on Rockstar’s Grand Theft Auto Online and Bungie shooter Destiny.

Lizard Squad proclaim themselves the “kings” of DDoS attacks.

Source: http://www.ibtimes.co.uk/xbox-live-lizard-squad-hackers-promise-ddos-attacks-christmas-1477830

Xbox Live is online again after suffering an outage today, with a hacker group claiming to have DDoSed its servers.

Their alleged antics left many in the United States and Canadaunable to connect to the service at all, while others reported that only their friends lists were affected.

Thankfully, it appears the service is now back up, with the Xbox Live status page reporting no problems.

The group Lizard Squad took ‘credit’ for the outage on Twitter, and is threatening to do it again over Christmas, because some people are just like that. The group also claimed to be behind PSN’s issues back in August.

Source: http://ca.ign.com/articles/2014/12/02/xbox-live-on-its-feet-again-after-alleged-ddos-attack

The Toronto Police Service website went down on Sunday evening after a Twitter user threatened to hack it.

According to police, the site was the subject of a Distributed Denial of Service (DDoS) attack.

Twitter user @AerithTOR claimed responsibility for the attack on the social networking site.

A DDoS attack floods a website with several requests and if the website’s server cannot handle the volume of requests, the website crashes.

@AerithTOR also suggested that they would be targeting the Conservative Party of Canada and Parliament of Canada websites. Both sites were online Sunday night.

The Ottawa Police Service and Supreme Court of Canada websites went down on Saturday evening. The Ottawa police website was still down as of Sunday night.

The City of Ottawa website was hacked Friday evening and replaced with a black screen and a dancing banana, along with a message attributed to @AerithXOR. @AerithTOR claimed this was his former account and said it had been suspended.

The message the hacker left on Ottawa’s police website contained the name of an area police officer. The officer was involved with the investigation of an Ottawa teen who is alleged to have made calls reporting fake emergencies to emergency services agencies across North America.

Toronto police were unavailable for further comment. The Toronto Police Services website remained offline on Sunday night.

Source: http://www.thestar.com/news/crime/2014/11/24/toronto_police_service_website_down_after_ddos_attack.html

Cyber attacks targeting Turkey are far more numerous than the global average, according to data provided by American cyber security company Arbor Networks.

While in the second quarter of 2014 the global frequency of cyber attacks dropped by 68 percent, in the same period attacks directed at Turkey recorded an increase of 6 percent. The countries from which Turkey received the most attacks in the second quarter were Russia, the US and Switzerland.

Eric Michonnet, European director of Arbor Networks, which provides network security services to 90 percent of the world’s service providers, noted that Turkey’s average attack frequency was much higher than the global average. Explaining that cyber attacks are generally organized against financial institutions and Internet sales sites, Michonnet said the aim of the attacks is to inflict economic harm on the institution against which the attacks are organized.

Stating that Arbor Networks’ goal is to protect Internet service providers’ security, Michonnet said: “With the special systems we’ve placed in service providers, we’re preventing attacks on Turkey from several countries of the world before another attack affects Turkey.”

Michonnet explained that a cyber attack uses thousands of computers to enter a target website, congest it and block access to the site. He also noted that in the first half of 2014 the average size of a cyber attack was 3.39 gigabytes and the largest-capacity cyber attack had a base of 124 gigabytes.

Arbor Turkey Director Serhat Atlı commented that in recent years cyber attacks have particularly targeted Internet sales sites. Explaining that thousands of Internet users shop on these sites every day and that these attacks cause great economic damage, Atlı noted that some of these Internet sites have taken their own measures to prevent these attacks. He also stated that companies can arrange for cyber attacks to be carried out against their rivals.

In the first half of the year, the largest distributed denial-of-service (DDoS) type of attacks were perpetrated from Malaysia, Switzerland and Russia. In the second half of the year, the largest attack came from Russia, followed by the US and Switzerland.

A DDoS attack is used to harvest bank details, the aim being to cause surprise and to camouflage the real attack, as data theft can be carried out after the system has been penetrated. One way of performing a DDoS attack is through a botnet, which can contain over 100,000 bots. Bots are chosen because they are practically impossible to follow and locate, are cheap and can be easily removed from the system following the attack.

Source: http://www.todayszaman.com/national_increase-in-cyber-attacks-targeting-turkey_364631.html

Update 5:50 a.m. PST:

The servers are now down for maintenance, and the attack is over. If further ones happen, we’ll announce accordingly.

Update 8:15 p.m. PST

The DDoS attacks continue. Blizzard is rolling out updates to the backend services at a breakneck pace right now, some of which are having unintended consequences and further complicating an already messy situation. However, it should be noted that this is to be expected when combating such a large scale attack. In no way is Blizzard responsible for the server outages on this scale — responsibility rests with the script kiddies and bot net controllers.

It’s hard to know just how big this attack is, but with the sustained issues it’s causing, and the severity of response from Blizzard, it’s safe to assume that it’s big. Battle.net is a hardened internet service that has withstood onslaughts like this before. For it to fail at such a critical juncture is nothing but catastrophic for the short term, and could have serious long term implications. We have some idea, shown above, of just how global this attack is.

We’ll update this post as the night continues, providing you with the latest. In the mean time — we recommend you catch up on your lore, and not concern yourself with logging in.

Original Post:

WoW Insider received reports earlier today that Blizzard may be the target of a significant DDoS effort — and community manager Bashiok has confirmed it on the World of Warcraftforums.

Bashiok goes on to outline additional issues Blizzard is currently attempting to resolve: instance servers timing out, disconnects from the continent servers, and performance and phasing issues with garrisons.

Source: http://wow.joystiq.com/2014/11/13/blizzard-confirms-world-of-warcraft-target-of-ddos-attack/