The Good Tech Companies - How Aleph Cloud Helped HyperSwap Mitigate a DDoS Attack and Save Millions in Cryptocurrencies

Episode Date: May 12, 2025

This story was originally published on HackerNoon at: https://hackernoon.com/how-aleph-cloud-helped-hyperswap-mitigate-a-ddos-attack-and-save-millions-in-cryptocurrencies. ... HyperSwap survived a major DDoS attack thanks to Aleph Cloud’s rapid anti-DDoS response, IPFS backup, and decentralized infrastructure resilience. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ddos-attack, #hyperliquid, #cloud, #aleph-cloud, #hyperswap-attack, #hyperswap-ddos-attack, #aleph-cloud-ddos-prevention, #good-company, and more. This story was written by: @alephcloud. Learn more about this writer by checking @alephcloud's about page, and for more stories, please visit hackernoon.com. HyperSwap was hit by a massive DDoS attack that impacted both their website and application. Aleph Cloud's anti-DDoS solution was used to redirect the attack traffic to a black hole. This incident marked the first successful deployment of Aleph’s experimental DDoS solution, developed to protect decentralized applications.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. How Aleph cloud helped hyper swap mitigate a DDoS attack and save millions in cryptocurrencies, by Aleph cloud. On the night of May 5th to 6th, hyper swap washed it by a massive DDoS attack that impacted both their website and application. As hyper swap was already using some of our cloud solutions, we quickly stepped in to support them migrating their frontend and redirecting the attack traffic to mitigate its effects. TLDR implemented a custom anti-DDOS solution. Our team reacted immediately. All of cloud services remained fully operational. Hyperswap's infrastructure initially lacked a proxy and did not have sufficient protection against DDoS attacks. However, they had deployed a fallback version of their application via
Starting point is 00:00:49 IPFS, pinned on our network, in case their main servers were compromised. Unfortunately, on the night of the attack, Hyperswap's main server was overwhelmed. While the API remained live, its performance degraded significantly. Their team redirected traffic to our network in an emergency move, which caused some turbulence before we could fully respond. Meanwhile, our dev team activated our internal anti-DDOS system, offloading attack traffic to a black hole and stabilizing the situation. Greater than the ALEF team quickly stepped in to support us by ensuring the IPFS hosted greater than version was accessible,
Starting point is 00:01:26 allowing users to continue accessing the app while we greater than worked on mitigation. At the same time, the InfraRater team, with their greater than experience in indexing and handling high throughput environments, acted greater than swiftly and effectively. They immediately understood the situation and greater than deployed the necessary resources to counter the attack, setting up new greater than proxies, implementing alert systems, and reinforcing our infrastructure. On our side, we helped the hyper swap team migrate their website to our internal on TDDoS platform and redirected the attack to a black hole. This incident marked the first successful deployment of Aleph Cloud's experimental
Starting point is 00:02:03 anti-DDoS solution, developed to protect decentralized applications from targeted disruptions. What is a remotely triggered black hole? RTBH, RTBH filtering is a network security technique used to mitigate DDoS attacks by or directing malicious traffic to a null route, effectively making it disappear. Think of RTBH as a trapdoor at your network's entrance. When a flood of harmful traffic is detected, RTBH diverts it into this black hole, preventing it from reaching or slowing down the network and its users. What's next? Hyperswap plans to deploy their APIs on OLEF Cloud to create a fully decentralized version of their application,
Starting point is 00:02:41 one that's resilient to future attacks. We will continue to develop and improve our anti-DDOS solution, which proved effective in this real-world test. This successful mitigation highlights the power of decentralized infrastructure to deliver security, resilience, and true censorship resistance. Thank you for listening to this Hacker Noon story, read by Artificial Intelligence. Visit HackerNoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.