Social coding site GitHub revealed in a recent blog that it was experiencing its largest DDoS attack to date. The attack was first reported via Twitter on Thursday, saying that the site had been under DDoS fire for 24 hours. The attack was "evolving," the GitHub blog added, and coming in a "wide combination of attack vectors."
"These include every vector we've seen in previous attacks as well as some sophisticated new techniques that use the web browsers of unsuspecting, uninvolved people to flood github.com with high levels of traffic," the blog said. "Based on reports we've received, we believe the intent of this attack is to convince us to remove a specific class of content."
On Friday, GitHub said it managed to get everything operating normally but then posted some hours later that the attack had ramped up again. GitHub said it had deployed "volumetric attack defenses" against the attack, thereby stabilizing site performance.
"We are completely focused on mitigating this attack. Our top priority is making sure github.com is available to all our users while deflecting malicious traffic," GitHub said.
DDoS stands for Distributed Denial of Service, which essentially floods a target with packets in hopes of either knocking the target's server offline or flooding the server with traffic to the point that web surfers cannot connect. These DDoS attacks are typically sent by more than one individual.
As of 11:50 UTC, the GitHub status page on Monday reported that all systems were up and running perfectly. The attack on the site continues, however, and thus GitHub remains on high alert. Hours prior, the site said that the DDoS attack had evolved again, and that GitHub was "working to mitigate."