Bitfinex (cryptocurrency exchange) is down due to DDoS attacks

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn34

Bitfinex (the world’s biggest cryptocurrency exchange by volume) was forced to shut down its continuous operations after experiencing a distributed denial of service (DDoS) attacks on Tuesday, December 12th.

DDoS attack is an attempt to make an online service unavailable by flooding it with traffic from various origins.

While Bitcoin’s price goes higher and higher, it’s no surprise that the exchange would find itself in the crosshairs of attackers. Denial of service (DoS) attacks are regularly concentrated efforts launched against an individual or organization. While the source of the attack against Bitfinex is still unknown, it is likely safe to believe it is a targeted and intentional attack.

According to Bitfinex:
We are currently under heavy DDOS. API is also down. We are working on further mitigation

Bitfinex has been under significant denial-of-service attack for the past several days. The attack has recently worsened.

Bitfinex said that it suffered a similar attack last week. It stated the issue on December 7 but said that the campaign had been ongoing for many days. The company also said that “Some services returning online with reduced performance. Continuing work to mitigate the attack.”

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn34
The following two tabs change content below.

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Leave a Reply