Special Features

Cybersecurity Month

Internet Archive wobbles back online, with limited functionality

DDoS detectives deduce Mirai used to do the deed, using home entertainment boxes in Korea, China, and Brazil


The Internet Archive has come back online, in slightly degraded mode, after repelling an October 9 DDoS attack and then succumbing to a raid on users' data.

For several days after the attack, the Archive loaded into the basic page depicted below.

Archive.org's distress homepage – Click to enlarge

At the time of writing (0400 Wednesday UTC, 2100 Tuesday PT), The Register has seen the site sometimes load that page, but sometimes load another that's closer to the Archive's usual busy home page – but omits many items.

It's unclear why the site is switching between the two (and yes, we cleared caches and used multiple browsers).

On October 13 the org's digital librarian, Brewster Kahle, advised that the Archive's services were "coming back up when they can, safely. e.g. Email working."

A day later, on the afternoon of October 14, Pacific Time, Kahle proclaimed the Wayback Machine – the service that preserves snapshots of web pages – was "running strong."

But he added: "Still working to bring archive items & other services online safely."

Network visibility outfit Netscout has shared its view of the incident, suggesting the DDoS ran for around three hours and twenty minutes and saw around five gigabits per second of traffic directed towards the site.

Netscout analysis of Internet Archive DDoS – Click to enlarge

Netscout's analysts watched that traffic target three IP addresses used by the Archive, and wrote "The DDoS attacks were mostly composed of two attack vectors: TCP RST floods and HTTPS application layer attacks."

The org also "discovered characteristics and shared open ports indicative of Mirai variants." Readers may recall that Mirai is nasty malware that subverts Linux-based devices and turns them into a botnet. Netscout asserted, with moderate confidence, that the attack came from "a modern Mirai variant … which incorporates packet-spoofing features."

For what it's worth, Akamai also recently spotted new Mirai variants.

Netscout also reckons much of the DDoS traffic involved "a well-known home entertainment and IoT product."

Most of the hosts spewing traffic at the Archive were devices "in Korea and China, followed by Brazil."

No actor has been named as driving the DDoS.

Kahle and the Archive have not yet detailed the incident, or any steps taken to harden the site against future heists. Fair enough – they've been busy getting back online. But the 31 million users whose data leaked – and the millions more users of the Archive – will likely be keen to know more before too much time passes. ®

Send us news
14 Comments

'Critical' CUPS vulnerability chain easy to use for massive DDoS attacks

Also, rooting for Russian cybercriminals, a new DDoS record, sneaky Linux server malware and more

Pixel perfect Ghostpulse malware loader hides inside PNG image files

Miscreants combine it with an equally tricky piece of social engineering

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Anonymous Sudan isn't any more: Two alleged operators named, charged

Gang said to have developed its evilware on GitHub – then DDoSed GitHub

Moscow-adjacent GoldenJackal gang strikes air-gapped systems with custom malware

USB sticks help, but it's unclear how tools that suck malware from them are delivered

Internet Archive user info stolen in cyberattack, succumbs to DDoS

31M folks' usernames, email addresses, salted-encrypted passwords now out there

NCA unmasks man it suspects is both 'Evil Corp kingpin' and LockBit affiliate

Aleksandr Ryzhenkov alleged to have extorted around $100M from victims, built 60 LockBit attacks

Necro malware continues to haunt side-loaders of dodgy Android mods

11M devices exposed to trojan, Kaspersky says

FBI boss says China 'burned down' 260,000-device botnet when confronted by Feds

Plus: Wray tells how bureau helps certain victims negotiate with ransomware crooks

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town

No malware crew linked to this latest red-teaming tool yet