Truckstop.com, a leading provider of software-enabled services to the trucking industry suffered a malware attack that crippled the company over the Christmas holiday week. The customer fallout for Truckstop.com is likely to be short-lived assuming the company is able to fully restore services by January 6th, when most trucking companies and brokers are back in full swing. Many members of the Truckstop team worked tirelessly through the Christmas week to restore systems and resume operations, sacrificing time with friends and family. The company, which is one of the largest payment and factoring providers in trucking, processed thousands of freight bills the night before Christmas. The malware attack was first reported by FreightWaves Monday morning, with Truckstop.com providing continuous updates to customers and FreightWaves through the holiday week. Truckstop.com teams have restored most major desktop services and continue working to bring critical systems back online, including mobile services.
Cable provider Volia appealed to the Cyber Police on the fact of fixing a DDoS attack on the Kharkov servers of the company, which has been ongoing since May 31. "For three days, from May 31 to today, the Volia infrastructure in Kharkov is subjected to cyberattacks. At first, they were carried out only on subscriber subsystems, later they switched to telecommunications infrastructure. As a result, more than 100,000 subscribers experienced problems using the Internet, IPTV, multi-screen platform, and digital TV," said the company. In total, the complete lack of access to Volia's services, according to the provider, lasted 12 minutes on May 31, 45 minutes on June 1. There was also an attack on the website volia.com, but it was managed to neutralize. "DDoS attacks were massive and well-organized. The type of attack is UDP flood and channel capacity overflow with the traffic of more than 200 GB. UDP is a protocol used for online streaming services - streaming, te...
Comments
Post a Comment