World of Warcraft – Hackers disrupt European online services

World of Warcraft – Hackers disrupt European online services

Have you also been experiencing constant lags and disconnects in the MMOs World of Warcraft, Diablo, Hearthstone and StarCraft 2 in the past few days? The Battle.net launcher is partially not working anymore and only reports connection issues or tries to download the last patch repeatedly.

No worries, it’s not your PC’s fault, even if the pop-up with the long error code wants to make you believe otherwise: DDoS attacks on European online services are the reason for the annoying problems this time.

Over the weekend, […] players were affected by high latency and disconnections, which were the result of a series of DDoS attacks on various European servers. Although our infrastructure was not directly affected, some of you still experienced these issues due to the ripple effect.

It is not your PCs or Blizzard’s databases that are affected, but the data centers that relay the data. There is a massive flood of requests being sent to the servers of these online services to overload the systems. While you log in, for example, millions of other login requests are being made that paralyze the server data centers. As long as these nodes are under attack, issues will arise – not just with Blizzard. The online gaming service Steam has also been struggling with connection issues lately. Whether it is the same cause remains unclear. As well as which online services are exactly involved.

However, it is clear: Last night there was an update from the community manager Rynundu that attacks are still ongoing – so the problems in WoW will probably continue for a while.

Did your raid also have to be canceled because of this or did you log out in frustration?

Source(s): Aktuelle Verbindungsprobleme
Deine Meinung? Diskutiere mit uns!
0
I like it!
This is an AI-powered translation. Some inaccuracies might exist.
Lost Password

Please enter your username or email address. You will receive a link to create a new password via email.