Take a Virtual, Interactive Tour 

Cyber Security

3 Min Read

Fire the Cannons!




With recent events occurring in China, the Hong Kong protests and the increasing rise of violence from the government it's only natural for protesters to organize on forums and other sites. Well, unfortunately, these forums are targets for the government, particularly the online forum LIHKG which is often referred to as the Hong Kong version of Reddit. The Great Cannon is an infamous DDOS (Distributed Denial-of-Service) tool that was deployed onto LIHKG.

Now with the Great Cannon back online it has a record. The Great Cannon rose to its infamous status when it was used on GitHub due to users sharing tools to bypass China's censorship, then on a Chinese website based in New York. But how does it work? 

A 2015 report from Citizen Lab suggests that the Great Cannon and The Great Firewall both share code and are also located within the same servers. The way it would function is by intercepting traffic meant for websites hosted inside China and injecting JavaScript code in the responses users received in their browsers. This malicious JavaScript code executed in users' browsers and secretly accessed a victim's site generating gigantic traffic spikes for the victim and its web server.

"According to LIHKG, the site received more than 1.5 billion requests per hour during the August attack, compared to the site's previous traffic record that was only a meager 6.5 million requests per hour." (ZDnet)

With this mean tool unleashed, China is wise to use it rarely as they could get a lot of bad press (who knew). Just more ways for China to censor its people.

Courtesy of (Catalin Cimpanu)


GitHub Wants Your Policy Proposals

In light of the recent leak of Twitch’s source code (over 6,000 private GH repositories) and other information, through a 125GB data torrent over 4chan.org, GitHub (GH) is now stepping up their ...
Picture of Micah Turpin Micah Turpin 3 Min Read

Golang the new standard for malware langauge?

In a recent security report by cybersecurity firm Intezer, they reported that a huge spike of malware strains being coded in Go programming has increased about 2,000% in recent years.

VMware vulnerability leaves about 6,700 servers ripe for the picking.

VMware vCenter servers have been hit in a new attack which left them exposed and vulnerable by the hackers which allowed them to take over any unpatched machine and take over companies' entire ...