Skip to main content

Evernote and Feedly bogged down by DDoS attack in extortion attempt

evernote feedly bogged ddos attack extortion attempt app screens

Evernote and Feedly were targeted in separate distributed denial of service (DDoS) attacks. The two companies, which have highly integrated services, have had varying degrees of success in their attempts to restore service to users.

Feedly continues to look for a solution to the DDoS attack, with user feeds still inaccessible through its website and app. In spite of the disruption, the company assured customers that user data were not compromised.   

“We’re making some changes to our infrastructure that will allow us to bring feedly back online. However, these things take some time to put into place and it may still be a few more hours before service is restored,” the company said in a blog post.  

A few hours later, Feedly sent out a tweet, saying that it is still trying to defend against the cyberattack. 

In a previous update, the company said that it refused to give in to the demands of hackers, who asked for payment in exchange for discontinuing the disruption. “Criminals are attacking Feedly with a distributed denial of service attack (DDoS). The attacker is trying to extort us money to make it stop. We refused to give in and are working with our network providers to mitigate the attack as best as we can,” the company said.

Evernote alerted users of accessibility issues yesterday afternoon. In separate tweets, the company warned users of problems with accessing its service.

Late last night, Evernote announced that it had resolved the issue, although it warned users that they might experience vestigial glitches over the course of the next day. 

DDoS attacks usually involve thousands of computers that try to connect to a website simultaneously. The coordinated effort makes the target website inaccessible due to an excessive number of connections. The services of some major financial institutions such as Wells Fargo, Citibank, and Bank of America have previously been disrupted by hackers using this method.

Editors' Recommendations