Archive.today CAPTCHA Generates DDoS-Style Traffic Against a Blog
Archive.today CAPTCHA Generates DDoS-Style Traffic Against a Blog
A documented investigation shows archive.today’s CAPTCHA page executing a script that repeatedly sends automated requests to a third-party blog every few hundred milliseconds — traffic behavior consistent with a sustained DDoS-style attack.
What the CAPTCHA Page Is Doing
When the archive.today CAPTCHA page is open, it runs client-side JavaScript that automatically sends repeated search requests to a specific blog URL. These requests continue without user interaction.
Why This Creates DDoS-Level Load
fetch("https://target-site.com/?s=random");
}, 300);
For non-technical readers: this means the page sends about three automated requests per second to the same site, using random queries that prevent caching. Over time, this creates constant server strain.
Public Discussion & Verification
The findings triggered extensive analysis and debate across Hacker News and Reddit, where users reviewed screenshots, code behavior, and the broader security implications for web archives and site owners.
Comments
Post a Comment