Phone calls disrupted by ongoing DDoS cyber attack on

Phone calls disrupted by ongoing DDoS cyber attack on VOIP.msreader comments

47 with 41 posters participating

Quebec-based provider of telephony services is facing an aggressive Distributed Denial of Service (DDoS) cyber attack, causing a disruption in phone calls and services. The incident began around September 16 and has put a strain on the VoIP provider’s systems, websites, and operations. serves over 80,000 customers across 125 countries, many of whom are now facing issues with voice calls.

Voice calls and services disrupted by DDoS attack

Last week, Canadian voice-over-IP service provider announced that it became aware of an issue that was preventing customers from accessing its website and was working toward a solution. Fast-forward to today: the issue is ongoing and has been attributed to a persistent DDoS attack.

DDoS is a form of cyber attack in which multiple computers, or “bots,” are simultaneously engaged by an attacker to make a large number of requests to an Internet server beyond the server’s capacity. As such, an Internet server, when facing a sophisticated DDoS attack, may offer degraded performance to customers, or crash altogether. VoIP is a set of technologies that make telephone calls possible via Internet-connected servers, which, like any Internet service, makes them vulnerable to DDoS attacks.

As of today, is still battling the cyber attack:

As seen by Ars, the website is now requiring visitors to solve captchas before letting them in. Prior to this, the website was throwing HTTP 500 (service unavailable) errors on occasion. website asks for captcha.

Enlarge / website asks for captcha.

Once in, the website states: “a Distributed Denial of Service (DDoS) attack continues to be targeted at our Websites and POP servers. Our team is deploying continuous efforts to stop this however the service is being intermittently affected.”

noted Twitter user PremoWeb, pointing to a Pastebin note that has now been removed. The removed note retrieved by Ars shows the attackers’ initial ask was for 1 Bitcoin, or a little over US$42,000:

Now-removed Pastebin note retrieved by Ars.

Enlarge / Now-removed Pastebin note retrieved by Ars.

But, two days later, the demand was upped to 100 Bitcoins, or over US$4.2 million:

“Ok, enough communication… The price for us to stop is now 100 Bitcoin into the pastebin BTC address. I am sure your customers will appreciate your 0 [expletive] given attitude in multiple law suits,” read the tweet signed “REvil.”

Attackers increased demand from 1 BTC to 100 BTC.

Enlarge / Attackers increased demand from 1 BTC to 100 BTC.

Earlier this month, UK-based telecom VoIP Unlimited was slapped with a similar DDoS attack, suspected to originate from “REvil.” However, threat actors behind these attacks are likely different from the REvil ransomware operator.

“REvil is not known for DDoS attacks or publicly demanding ransoms, in a manner done in the attack,” explains Lawrence Abrams of news site BleepingComputer. “This attack’s method of extortion makes us believe that the threat actors are simply impersonating the ransomware operation to intimidate further.” customers can monitor the company’s Twitter feed for updates on the situation.

Article Tags:
Article Categories: