Category Archives: DDoS Criminals

Will we ever can the spam monster?

An unending battle against email-borne nasties and botnets Spam may be the best known security threat in the world. Anyone with email or a Facebook account has experienced it, despite providers’ best efforts to block it from their inboxes.…

Continue Reading:
Will we ever can the spam monster?

The History of DDoS Attacks as a Tool of Protest

Although the web is only a quarter of a century old, it already has a rich history as a platform for worldwide protest. One common tool used by online activists is the distributed denial of service attack, or DDoS: a technologically crude tactic that involves sending so many requests to a target website that it crashes. In recent years, politically motivated DDoS attacks have been launched on the websites of financial giants and local government departments. This year, websites affiliated with the football World Cup were brought down in protest against FIFA. “DDoS has been around as an activist tactic probably since the early 90s,” Molly Sauter, a research affiliate at Harvard University’s Berkman Center for Internet and Society and doctoral student at McGill University, told me. Sauter is the author of the upcoming book The Coming Swarm: DDoS Actions, Hacktivism and Civil Disobedience , which details the history of the DDoS attack from an obscure, insular activity carried out by artists and intellectuals to a hallmark of 21 st century protest. The earliest example of a DDoS attack that Sauter found in her research was implemented by the Strano Network, an Italian collective that launched an attack in 1995 to protest against the French government’s nuclear policy. Back then, DDoS attacks were laborious, manual affairs, requiring participants to constantly remain at their computer. And because having an internet connection was relatively expensive, they couldn’t last for long. The attack in this case only endured for about an hour. The next major milestone was the use of DDoS by the Electronic Disturbance Theater (EDT). Originating in the 90s, and attracting the attention of the media by the end of the decade, the hacktivist group described DDoS as akin to a “virtual sit-in.” One thing that separated them from their predecessors was their use of tools developed in-house, which allowed anyone outside of the organisation to join in. Their kit, called FloodNet, directed a user’s traffic to a target predetermined by the EDT, which included the websites of politicians and the White House. Those wishing to join the “sit-in” simply selected their target from a drop down menu, clicked attack, and relaxed while FloodNet automatically bombarded the offending server. The well-known hacker collective Anonymous took this idea of crowd-sourced activism further, and popularised the idea of voluntary botnets. Often used by criminals, a botnet is a large number of systems, all linked together, which give whoever is in charge of them a whole lot of processing power to wield. DDoS is incredibly simplistic, at a purely technological level. By using the hacker-designed software Low Orbit Ion Cannon, and its subsequent upgrades, participants could connect their computer to a vast network and have it donate resources to DDoS attacks. And that pretty much brings us up to today. “DDoS is incredibly simplistic, at a purely technological level,” Sauter said. “While there might be individual innovations in ways of masking or multiplying traffic, it’s not actually going to get much more advanced than that.” But it’s not just the technical details of DDoS that have mutated over the years. The scale of attacks using the device has developed, too. “Groups have become better at attracting, acknowledging and manipulating media coverage in order to attract more participants,” Sauter explained. While earlier groups just did their own thing, Anonymous managed to engage those outside of their immediate cohort more readily. With their iconic imagery, popular Twitter accounts and evocative videos, the media had a lot of material to work with. The press lacked any sort of official spokesperson of Anonymous to talk to—“So they just tended to reproduce these artifacts in media coverage, which did the work of recruitment for Anonymous,” Sauter observed. “Anonymous didn’t have to do a lot of ‘active’ outreach. That was being done for them.” What actually constitutes a ‘successful’ DDoS attack has also changed. “In the 90s, you could sit in front of your computer with your friends, go to whitehouse.gov, click refresh a bunch of times, and you had a significant chance of the website crashing,” said Sauter. An industry has since emerged to offer protection from DDoS attacks, so crashing a major service today is rarer, though still possible with some serious fire-power. But there’s another way to measure the success of DDoS actions than just website down time. Sauter explained that, when it comes to activism in general, “The logic of change is that you have an action, you get covered in the press, then politicians and the public react to the press coverage, not so much the action itself.” This overall impact is perhaps more important than how long a specific website is technically inaccessible. As Sauter said, “The question of what success means is fairly up in the air.” Some argue that DDoS as a protest tool should be formally recognised as political speech, and enjoy the same free-speech protections as street marches, for example. Jay Leiderman, a criminal defense lawyer, has argued that DDoS is a first amendment issue in defence of the “PayPal 14,” a group of WikiLeaks supporters involved in a DDoS attack against the e-commerce business. Attorney Stanley Cohen, who represented one of the accused, described the act as an “electronic sit in,” and members of Anonymous also created a petition, pushing for politically motivated DDoS to be legalised. CIVIL DISOBEDIENCE AND OTHER TYPES OF ORGANISED LAW BREAKING ONLINE ARE STILL CONSIDERED VERY MUCH FRINGE ACTIVITIES. But DDoS can of course also be used for much less sympathetic purposes. “The biggest problem that activist DDoS faces in terms of its fight for legitimacy is criminal DDoS,” said Sauter. “DDoS is a very popular tactic in terms of harassment, extortion and other criminality.” For example, botnets for DDoSing purposes are reportedly already being created to exploit the Shell Shock bug, a recently revealed weakness in Linux and Unix operating systems. Furthermore, Sauter suggested that online activism in general still isn’t really accepted because it remains an alien concept to many people. “Civil disobedience and other types of organised law breaking online are still considered very much fringe activities because there isn’t an understanding that civil disobedience is something that you can do on the internet,” Sauter said. “That I hope is something that will change, but it will take a legal challenge.” But Sauter feels that political DDoS will continue to gain popularity when it comes to activism, and that it might even have something more to give. Whether it’s the Electronic Disturbance Theater protesting against neoliberalism, or Anonymous rising up to fight what they see as injustices, DDoS actions do not exist in a vacuum. Today, politically motivated DDoS is often part of a broader activist culture in the information age. Sauter suggested it could therefore introduce activists to other ideas, “such as information exfiltration, and leaking, and the construction of alternative infrastructures to replace the corporate-dominated and government-surveilled that are currently the main ways of socialising and communicating online.” In short, DDoS attacks in activist circles can be about more than just crashing a few servers. Source: http://motherboard.vice.com/en_uk/read/history-of-the-ddos-attack

Visit link:
The History of DDoS Attacks as a Tool of Protest

Researcher details nasty XSS flaw in popular web editor

First denial, then anger, then DDoS , then patching. A tool that’s popular with Microsoft’s in-house developers, the RadEditor HTML editor, contains a dangerous cross-site scripting (XSS) vulnerability, researcher GS McNamara says.…

See the original post:
Researcher details nasty XSS flaw in popular web editor

PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai

First time the cache network has seen drop in use of 32-bit-wide IP addresses Broadband and IPv6 are hot – and distributed denial-of-service attacks and IPv4 are not. Well, that’s according to Akamai.…

Link:
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai

Telegram under 150Gbps DDoS attack

Cross platform messaging app Telegram has been a target of massive distributed denial of service (DDoS) attacks for two days in a row over the weekend with the largest in tune of 150Gbps. The DDoS attacks started on Saturday – September 27 – and according to Telegram the scale of the attack was in tune of tens of Gbps. “A DDoS attack on Telegram in progress, tens of Gigabitsec. Users in some countries may have connection issues. We’re working on it, folks!” tweeted Telegram. Prior to the official confirmation, users started complaining of connectivity issues as well as not being able to send messages successfully. These complaints were picked up by Telegram administrators and upon investigation they zeroed it down to DDoS attack. Telegram soon managed to recover from the attack, but DDoS perpetrators launched another massive attack and this time in tune of of 150Gbps. “Detecting a 150+ Gbit/s DDoS now, an attack three times as large as yesterday’s.” tweeted Telegram. Users are still complaining about connectivity issues and there has been no confirmation from Telegram on whether they have been able to resolve the issue or not. Source: http://www.techienews.co.uk/9718714/telegram-150gbps-ddos-attack/

Continued here:
Telegram under 150Gbps DDoS attack

Spammer uses innocent hacked blogs to punt NAKED PICS of JLaw, McKayla Maroney

Gran’s knitting site etc sucked up into pr0n spam botnet A long established smut spammer is using hacked websites to sell stolen photographs of naked celebrities including Jennifer Lawrence, Kate Upton and McKayla Maroney.…

Read More:
Spammer uses innocent hacked blogs to punt NAKED PICS of JLaw, McKayla Maroney

Ello social network hit by suspected BLOODY DDoS attack

Anti-Facebook site forced to temporarily wave Buh-Bye Ello, the social network site intended to serve as something of an antidote to ad-stuffed Facebook, was hit by a suspected Distributed-Denial-of-Service attack today.…

Read More:
Ello social network hit by suspected BLOODY DDoS attack

Mitigations for Spike DDoS toolkit-powered attacks

Akamai Technologies released, through the company's Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory that alerts enterprises to a high-risk threat of powerf…

Originally posted here:
Mitigations for Spike DDoS toolkit-powered attacks

Struggles with iOS 8 upgrades, traffic surges mimic DDoS attacks

Users upgrading devices to iOS 8 are struggling with long waits – while networks are being flooded by traffic (NASDAQ:AAPL, NASDAQ:AAPL) Apple users are frustrated with difficulty in upgrading to iOS 8, as download times are painfully long. To make matters worse, some networks are being slammed by so much traffic, it’s almost like they are under distributed denial-of-service (DDoS) attack. Networking company Procera Networks found one CIS mobile network that saw its network traffic jump an incredible 4000 percent than normal – an astronomical traffic amount for non-video applications. Everything from Apple’s iPhone models to its smartwatch were criticized – but anytime there is a new iOS release, Apple fans quickly flock to download the latest operating system. However, after just a few days, adoption for iOS 8 has been slower than that of iOS 6 or iOS 7, according to analysts. The iOS 8 upgrade requires 5.8GB of storage space, forcing some users to delete photos, videos, and other data to free up space to upgrade. Source: http://www.tweaktown.com/news/40240/struggles-with-ios-8-upgrades-traffic-surges-mimic-ddos-attacks/index.html

Continued here:
Struggles with iOS 8 upgrades, traffic surges mimic DDoS attacks

How to Protect Your Blog From an Advanced DDoS Attack Read

Although it’s pretty much unlikely that any high profile hacktivists are going to be targeting your website via a Distributed Denial of Service (DDoS) attack anytime soon, that’s not necessarily grounds for sitting back relaxed and complacent without a backup / protection plan. DDoS attacks are becoming more prevalent and much easier to execute thanks improvement in technology, bandwidth and accessibility to tools and information on how to do it. We continue to see big brands like Sony get brought down momentarily by these attacks, and even the CIA’s website suffered this pain in 2012. It’s a serious threat. For clarification, DDoS attacks happen through an overpowering of numerous computers, usually through the use of bots, that continuously send traffic to an IP address or website. As simple as this might seem, the effects can be brutal to a website. What’s worse is that the typical common security protocols that are set up to defend against hacking and intrusion just don’t work against DDoS attacks and taking matters into your own hands, whether it’s through WordPress security plugins or code tweaks and improvements are not sufficient. Luckily, there are a couple ways to protect a website from DDoS attacks. Using a Cloud Security Provider Using proprietary technologies, a number of web security companies have begun releasing different forms of protection from DDoS. These include the likes of Prolexic, for example, which has a fairly decent track record of mitigating web security threats. However, much of what these products do happens behind the scenes. In the push for full disclosure, more companies and website owners are relying more on cloud security providers, like Incapsula, who not only provide free usage of their CDN but also powerful DDoS protection at fairly reasonable pricing for anyone serious about their website’s security. Where other services just kind of tell us that things are being handled, Incapsula offers some pretty slick monitoring options that take your website security a step further than a service: It’s a tool. Going beyond just DDoS traffic mitigation, Incapsula protects against other forms of attacks and site outages (both malcontent and accidental) while simultaneously offering a speed boost through those same site mitigation channels; along with pretty much guaranteeing 100% up-time for complex applications through load balancing and failover, spread across multiple servers. What’s even better is that they provide visual and trackable insights into the site’s performance and health. Sophisticated web threat protection is becoming more available and affordable and it’s a valid inclusion among tools bloggers and other marketers normally utilize. Self-Protected Domain Infrastructure Bearing in mind that DDoS mitigation is not for the faint of heart or the modest wallet, I know there are some DIY admin types who live for the thrill of getting their hands dirty. Protecting against a DDoS attack on your own is a massive undertaking that’s easy to get wrong, which would leave you just as unprotected as if you had done nothing at all. But, if you’re up for the task and have the skillset required (seriously, be honest with yourself on this one, you or your client’s product is at stake here), the following Cisco reading material will get you moving in the right direction… if you really know what you’re doing: Discuss Options with Your Hosting Service Of the many web hosts online offering bottom dollar deals to get your website up and running , a vast majority of them don’t have the infrastructure set up to properly deflect a DDoS attack. This doesn’t necessarily mean that your cost-effective host, whichever it may be, doesn’t have protection, but that doesn’t mean that they do, either. Simply put, you should be contacting your preferred host(s) directly to determine precisely what they have in place to protect your site/sites from malicious attackers. Additionally, you absolutely need to know what their policy is on how to deal with sites that are suffering attacks that break through or overwhelm their servers. The punishment of a week or two of downtime from your host can be more damaging than the original attack itself since it’s more likely that your account will be blacklisted or suspended rather than the company taking full responsibility. Your best bet for protection via a web host is going with a premium provider like WP Engine who pride themselves on running very secure and well managed hosting environments. The most important thing you should keep in mind is that, for relatively little time invested, you can set a site up to be guarded against incredibly expensive attacks. There’s no reason to find yourself in a situation where you’re looking for protection after a DDoS is launched. The risk for loss of traffic and in some cases, sales, is much too great. Source: http://www.blogherald.com/2014/09/18/protect-blog-advanced-ddos-attack/

View original post here:
How to Protect Your Blog From an Advanced DDoS Attack Read