Attackers use virtual private network services and proxy infrastructure to carry out distributed denial of services attacks against Bulatlat and five other independent media organizations, findings of a Sweden-based digital experts revealed.
Tags: qurium media foundation
Sweden-based forensic experts now subjected to cyberattacks
“The pen-testing on Qurium’s website proves that the cyberattackers are undaunted, bolstering our belief that such actions are state-sanctioned and part of the systematic efforts in silencing and intimidating the Philippine media.”
Solon seeks probe on cyberattacks vs alternative news, human rights websites
“As lawmakers, it is our duty to ensure that public funds are used judiciously for the benefit of the people, and not used to violate their civil and political rights enshrined in our Constitution.”
Alternative media submit evidence vs. IT companies over cyber-attacks
“We firmly believe that legitimately exercising a right and seeking appropriate redress at the proper forum when that right is violated can never be penalized or begrudged.”
Int’l media watchdog ‘mirrors’ Philippine alternative news amid cyber-attacks
International media watchdog Reporters Without Borders has included in their website mirroring campaign two Philippine alternative news websites, Bulatlat and Kodao Productions, following the intense cyber-attacks since December.
Cyber hit squads
Illustration by DEE AYROSO
What you need to know about the ongoing cyber-attacks vs. alternative news Bulatlat
What is Bulatlat? Bulatlat is an online news magazine established after the ouster of former President Joseph Estrada. Press freedom advocates and human rights defenders gathered to form the news agency to tap the then booming internet in the country to help explain issues and government policies and to contribute towards shaping public opinion by…
Alternative news Bulatlat under attack again
The attackers, the group said, have attacked their “front-end at Cloudfare and later on they directed the attack to the hosting site,” using at least 1,100 compromised computers “to flood the website with requests.”