WikiLeaks, the focus of attention since it released a quarter-million U.S. diplomatic cables two days ago, is again under a denial-of-service (DoS) attack, Internet researchers said today.
The site remained online with some short interruptions, however, as did a secondary site, cablegate.wikileaks.org, where nearly 300 U.S. State Department internal messages have been published thus far.
[The attackers] have upped their game," said Craig Labovitz, chief scientist at Arbor Networks, a supplier of anti-DoS technology.
"This looks like a different attack from yesterday. It's a more complex attack, with multiple components, and it's a more significant attack," added Labovitz.
WikiLeaks echoed Labovitz's take on today's attack. According to the organization's Twitter account, Tuesday's attack quickly reached 10Gbit/sec (gigabits-per-second), or two-and-a-half to five times larger than Monday's.
Labovitz estimated yesterday's DoS, which was launched by a single hacker, at between 2Gbit/sec and 4Gbit/sec.
WikiLeaks has been under assault since shortly after it began publishing diplomatic cables from a trove of more than 250,000 messages. The group provided several newspapers with the complete cache, but is releasing the cables to the public in small dribbles on cablegate.wikileaks.org. In the U.S., the New York Times has been writing about the contents of the cables.
Both WikiLeaks' main site, wikileaks.org , and the Cablegate site were being attacked today, said Labovitz.
Labovitz declined to go into specifics on the extent of Tuesday's DoS, saying that he was still compiling data from Arbor's ATLAS (Active Threat Level Analysis System) network, which collects Internet traffic data from approximately 120 carriers and providers worldwide.
U.K.-based Netcraft, however, spelled out its findings in detail.
According to Netcraft's traffic measurements, WikiLeaks and Cablegate were both hit hard today, with the latest failures of the sites occurring about 6 a.m. ET.
Netcraft explained how WikiLeaks and Cablegate remained operational for the most part during the DoS attacks.
"The cablegate hostname is still configured to use three different IP addresses on a round-robin basis, essentially acting as a load balancer," said Netcraft's Paul Mutton in a post to the company's blog Tuesday.
Labovitz had a different idea.
"They've been moving their hosting around," said Labovitz, referring to WikiLeaks. "They seem to have gone from using small providers to using larger providers, which have better capabilities to deal with these attacks."
Most large hosting companies use one or more technologies or techniques to fend off DoS attacks, Labovitz continued. "DoS is part and parcel of the Internet today," he said. "There's nothing unique to WikiLeaks except the amount of publicity it's received. There are enterprises that [undergo] much larger DoS attacks on a regular basis."
Yesterday, WikiLeaks shifted its site to servers operated by Amazon.com.
Although a single hacker, who goes by the nickname of "The Jester" -- penned in leetspeak as "th3j35t3r" -- claimed responsibility for Monday's attack, which one security expert said was not launched via a botnet, today's DoS looked more coordinated, said Labovitz. He wasn't able to tell, however, whether it originated from a single source or from a botnet.
"There's enough publicity surrounding WikiLeaks [and the leaked cables] that this will be an ongoing event for them," Labovitz said.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org .
Read more about security in Computerworld's Security Topic Center.
This story, "DoS Attacks Hammer WikiLeaks for Second Day Running" was originally published by Computerworld.