DDOS Attacking

What a pleasant person they must be to think annoying people for money is a good way to make a living. I hope you find a way to get him to stop. There must be a hosting company out there somewhere that gives a monkeys about their customers and will help you out.
 
The thing is that we seem to find a smaller server provider that is willing to help us with creating firewall rules and making changes but as soon as the attacker goes full scale attack mode which he did couple of night ago the smaller provider's bandwidth couldn't cope with the influx of UDP data (60GB) and then null routed our server taking it permanently offline with the provider for 4 hours as that amount of data was effecting other customers at the data center.

We then try a larger company who can withstand this kind of attack but 2 bad things 1 it is costing more and more to have a server with silly amount of bandwidth despite us not using anywhere near what we are paying for just to keep this guy from attacking and also being a bigger company most of the time they seem more inclined to to help as much and let us setup our own custom firewall rules.

The annoying thing is this guy will just keep upping and upping the bandwidth he is using to attack the community with as booters are stupidly cheap :( which is what he is using.

We have gone down the official legal route now so guess will hope and fingers crossed something can be down.

and yea koolpc its not much fun at the moment as every game server that is up for this game is getting targeted and taken offline at the moment, there are people within the community who have put a lot of time, effort, and money in to try to get this fixed but at the moment its a never ending battle.
 
He can be traced very easily via his ISP or by the authorities but in there eyes game servers and dedicated servers being taken offline and attacked isn't a huge thing to them sadly and they thus far don't seem to bothered, only thing I guess we can use to make them pay more attention is that he attacks are now effecting business's hence the server being null routed as was effecting other servers, and the fact he is threatening people and trying to extort money from people to stop the attacks.
 
Thing is, if he is attacking you, who else is he attacking? Surely that would be a concern for the authorities? Mad!
 
That does indeed depend how this is looked upon because he has been attacking and taking down servers based in USA, France, Germany, and the UK, so you would think it would be serious enough to at least look at.

Hopefully we hear something soon or find some way of stopping this. (Hitman is sounding tempting at this point)
 
just point your DNS records to an NSA server :D Maybe he'll be foolish enough not to check what he attacks...

erm, ignore that :D probably not a good plan for you either...

Nox
 
Very tempting......

Annoying thing is he been doing this for years and getting away with it all a lot of small indie games and communities and seems to get off on it.
 
Don't underestimate the extents that bored script-kids go to.... Reminds me of someone who used to spend time 'hacking' auth bots on QuakeNet IRC channels and taking them over, then issued some ridiculous ransoms.

Things aside, I hope you find a way to deal with it soon :/
 
Is it outside the realms of possibility to put your game server on a new IP and behind a VPN, email all your clan/server buddies who play on it with the VPN details and strict instructions not to share it out?

Then as you guys have packed up and moved to a different area of the net and you are no longer advertising your IP, hopefully he will move on to another target. After a few months consider setting up in public with a new host that has better DDOS protection.

I'm sure there might be a gaping hole in my plan, but I've had a few beers so please excuse me if there is.

Good Luck
 
Is it outside the realms of possibility to put your game server on a new IP and behind a VPN, email all your clan/server buddies who play on it with the VPN details and strict instructions not to share it out?

Then as you guys have packed up and moved to a different area of the net and you are no longer advertising your IP, hopefully he will move on to another target. After a few months consider setting up in public with a new host that has better DDOS protection.

I'm sure there might be a gaping hole in my plan, but I've had a few beers so please excuse me if there is.

Good Luck

I second this I see no holes in this plan, keep drinking and I believe you might invent something that makes you a millionaire.
 
Is it outside the realms of possibility to put your game server on a new IP and behind a VPN, email all your clan/server buddies who play on it with the VPN details and strict instructions not to share it out?

I was thinking that, if you can hide the server from any server lists so you can only give out the IP by email, then you know he cant get his grubby little hands on it.
 
OP send me some details/screenshots/evidence in trust and I'll pass it on if I think there's enough to go on.


As above, try one of these companies to host (they are all OVH just sister companies but still using the same network infrastructure) - mid-tier SoYouStart range is quite the norm for gameservers and relatively inexpensive. If the attacker can still affect that then you have no chance unforunately.
 
Thanks for the replies guys, we are trying to go down that kind of route at the moment to see if it works aka the VPN/Tunnel, also we are already with OVH as stated before and we are having issues there as well.

Archeum, when you mean pass it on aka the details where do you mean? Sorry if abit slow here
 
Thanks for the replies guys, we are trying to go down that kind of route at the moment to see if it works aka the VPN/Tunnel, also we are already with OVH as stated before and we are having issues there as well.

Archeum, when you mean pass it on aka the details where do you mean? Sorry if abit slow here

Hey there, sorry, should've added that to the other post - it was early in the morning :)

I can get in touch with the relevant cyber crime departments far easier than others may be able to who will actually do something about it if there's enough to go on.
 
Do you actually need UDP?

Get your server/network company to drop UDP to your ranges at the border, that should help significantly if it's just a UDP flood. No doubt they'll come back with something else, but it would be a start.

For the price, OVH actually has very good DDoS filtering because they are the target and source of so many.
 
Back
Top Bottom