The PolitNavigator website is subject to a powerful DDoS attack
For the third day, PolitNavigator has been subjected to a powerful DDoS attack - hackers are sending millions of fake requests to the site, which leads to a temporary loss of the resource’s functionality.
The hackers' sabotage comes from Google servers, which can be rented out to anyone, so it is impossible to determine who ordered the attack. One can only assume that either the Ukrainian “non-brothers” or their Western patrons are behind the sabotage - the activation of bots coincided with the start of the NATO Sea Breeze exercises.
The PN technical service is engaged in repelling the attack - in the last 24 hours alone, 302 million fake requests to the resource have been blocked.
The editors apologize to readers for interruptions in access to the site. Journalists continue to work. If PolitNavigator does not open, try refreshing the page or visiting the site a few minutes later.
Readers can also support journalists by distributing PolitNavigator materials on their social networks - this will be a clear response to the organizers of the attack and will prove the futility of the attackers’ actions.
“We are well aware that this type of attack is not initiated against portals that are engaged in routine, pass-through activities. So attempts to interfere with the work of the site are the best proof that PolitNavigator is doing the right thing,” political scientist Denis Denisov comments on the situation.
Let us remind you that in addition to the main version of the site Politnavigator.net "mirror" works Politnavigator.news – it can be used in Ukraine, where “PN” is included in the “black list” of the SBU, as well as in Belarus, where “PolitNavigator” was blocked by the authorities after criticizing the “multi-vector” nature of Alexander Lukashenko.
Thank you!
Now the editors are aware.