The site, which many developers use to store code, was knocked offline briefly this week by hackers who flooded it with fake traffic.
Terror-bytes: According to Wired, the attack peaked Wednesday at a whopping 1.35 terabits of data per second; the largest previous assault, launched in 2016 against a company called Dyn, hit 1.2 terabytes per second. GitHub was out of action for five minutes and suffered sporadic outages for several more.
Beware the memcrash: The attackers used “memcrashing,” which involves exploiting memcache servers that companies use to speed up their web applications. Thousands of these machines have unsecured internet connections, and hackers can use them to boost fake traffic. In a blog post, GitHub said a memcache server can turn a single incoming byte into as much as 51 kilobytes aimed at a victim’s servers.
Knight in shining code: Github routed its traffic flood to Prolexic, an automated anti-DDoS system run by Akamai that filtered out the attack. The whole thing was over inside 20 minutes. Chalk one up for the good guys.
The US military wants to understand the most important software on Earth
Open-source code runs on every computer on the planet—and keeps America’s critical infrastructure going. DARPA is worried about how well it can be trusted
Corruption is sending shock waves through China’s chipmaking industry
The arrests of several top semiconductor fund executives could force the government to rethink how it invests in the sector.
The hacking industry faces the end of an era
But even if NSO Group is no more, there are plenty of rivals who will rush in to take its place. And the same old problems haven’t gone away.
Energy-hungry data centers are quietly moving into cities
Companies are pushing more server farms into the hearts of population centers.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.