This time, the DoS attack came from some two million separate end users, an indication that the attackers were now deploying one or more extremely large botnets of infected computers. Email dan.
Van Pelt said he suspects a rival VPN service was behind the attacks. With TorGuard back online, Van Pelt and his colleagues were on the receiving end of a rash of phishing e-mails, attempts to brute-force crack their e-mail account passwords, and repeated calls to the company's toll-free support number. The 10Gbps waves of traffic appeared to come from PowerStresser.
The new routes funneled the junk traffic into a virtual black hole rather than to the VPN servers. Then, finally, there was silence.
Ultimately, Van Pelt said the attacks have been a boon for TorGuard. They had just successfully rebuffed the latest in a series of increasingly powerful denial-of-service attacks designed to cripple their virtual private networking service.
Eventually, those measures proved futile as the new round of attacks delivered data floods as high as 15Gbps. Skip to main content The real "party van. The distributed nature of the attack and the much larger amount of data it delivered once again knocked TorGuard offline, despite the previous tweaks Van Pelt made. Once again, Van pelt said, operations returned to normal.
But almost without fail, shortly after a new address was provisioned, it would come under attack. He also cited a rash of attacks on other VPN services.
Rooomba wrote:. Aryan Blaauw. When those didn't produce any results, the unsolicited food deliveries and service calls started. Once again, about 24 hours after the e-mail went out, TorGuard came under another paralyzing attack. Within 24 hours, the company's support inbox received torrents of junk e-mails, and not the typical kind that flog male enhancement pills or sham investment proposals, either.
Throughout them all, however, the TorGuard service didn't go down. Despite torrents of junk traffic that reached peaks as high as 15Gbps, the admins had neutralized the offensive by locking down the TorGuard servers and then moving them behind the protective services of anti-DoS service CloudFlare.
A month later, TorGuard sent out a newsletter notifying customers of new network nodes added in Germany, Iceland, Japan, and Australia that were designed to make connections in those countries faster. A handful of local electricians and plumbing services were also disappointed to be turned away.
The drop off at 23: