Category Archives: DDoS News

Kelihos malware author, botnet herder named by Microsoft

Microsoft has named a new defendant in the ongoing Kelihos case. His name is Andrey N. Sabelnikov, of St. Petersburg, Russian Federation, and is believed to have written the code for and either cr…

Link:
Kelihos malware author, botnet herder named by Microsoft

Major Denial of Service Vulnerability Affects Most Web Servers

Security researcher Alexander Klink and Julian Wälde revealed a serious vulnerability that until recently affected the vast majority of web server. The attack only requires a single HTTP request that is specially designed to create hash code collisions in POST form data. When first discovered this attack affected Python, Ruby, PHP, Java, and ASP.NET, but vendors have been working with the researchers to produce patches. Tomcat  updates 7.0.23 and 6.0.35 address this issue by limiting the number of POST form fields to 10,000. The  change log  says that this is configurable, but no details were provided. The patch for  ASP.NET  was released on December 29. The patch will be automatically applied for Windows Azure customers with the default servicing policy. The patch works by limiting the number of POST form fields in a single request to 1,000, which is well below the number needed for a denial of service attack.  This value is configurable  using the appSettings key “aspnet:MaxHttpCollectionKeys”. Currently this can only be applied site-wide, but there have been requests for page-specific overrides. A fix was also added for related flaws in the JSON input and deserialization logic. PHP  5.4.0, which is only a release candidate also offers a max_input_vars directive. The  release notes  do not state what the default value is. So far every vendor we’ve discussed has addressed the issue at the web server level by limiting the number of fields in a single request. Another option is the use of a randomized hash code formula for strings.  Ruby  is one such language. .NET does this as well, but only for internal builds. Production releases currently have a set formula, but given the severity of this issue that may change the next time the CLR is updated. For Java it is not quite so easy; the JVM specifies the hash code formula for strings, which means developers may be relying on it to be consistent across all versions. An update for  Oracle Glassfish  is supposedly complete, but not yet available. There is no information of the method used to address the issue. More information about this issue is available on  Ars Technica  and the  Chaos Communication Congress  website.

Excerpt from:
Major Denial of Service Vulnerability Affects Most Web Servers

2012 network security trends

Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently taken off line, 64-bit roo…

Read the original post:
2012 network security trends

http://www.spamfighter.com/News-17155-Data-finds-over-1-m-UK-Home-PCs-Belonging-to-Botnets.htm

Data finds over 1 m UK Home PCs Belonging to Botnets The British Broadcasting Corporation (BBC) has reported that a Dutch security researchers’ group trying to determine methods by which compromising of home PCs can be lessened from getting criminally used, recently, discovered that crime botnets seized over 1m home computers in UK.

Read More:
http://www.spamfighter.com/News-17155-Data-finds-over-1-m-UK-Home-PCs-Belonging-to-Botnets.htm

McAfee Suspects Sophisticated Indulge at Cybercriminals’ Demeanor

According to McAfee’s third quarter security threats report (Q3-2011), revealed by Intel-owned security technology firm, cybercriminals seems to change their tactics of circulating malware for avoiding law enforcement, reports v3.co.uk on November 21, 2011. Commenting on the findings, Toralv Dirro, Security Strategist at McAfee Labs EMEA (Europe Middle East and Africa) said that as a result of a sudden augment of virus indulgence, large botnets are being shut down and operators are being driven to concentrate more on smaller and localized networks, highlights v3.co.uk on November 21, 2011. While explaining the matter, Dirro claimed that law enforcement becomes more interesting when the botnet is bigger

Read the article:
McAfee Suspects Sophisticated Indulge at Cybercriminals’ Demeanor

UK cops: ‘We thwarted Royal Wedding web attack plot’

Kid cuffed in DDoS probe UK cybercops have claimed credit for preventing attempts to blast the official Royal Wedding website offline in April, following the arrest of a teenager suspected of masterminding the attack.

Read more here:
UK cops: ‘We thwarted Royal Wedding web attack plot’

Researchers Show How Easy It Is To Infiltrate Facebook

A new paper being presented next month at the Annual Computer Security Applications Conference (ACSAC) shows easy it is to infiltrate Facebook and harvest valuable user data. Botnets, networks of hijacked computers controlled remotely for criminal gain or spreading propaganda, have been aggravating cybersecurity professionals for years. The near-billion people connected to social networks has made Facebook and Twitter the new juicy targets for similar schemes

Continue reading here:
Researchers Show How Easy It Is To Infiltrate Facebook

DoS attack rocks Palestine, cuts phones, internet

Large denial of service attacks have rocked Palestinian severing internet service to the West Bank and Gaza. The Palestinian Communications Minister Mashur Abu Daqqa told reporters the attacks originated from locations “all over the world … using mirror servers.” Up to a million packets a second had hit Palestine’s incumbent telephone company PalTel, local media said

Read More:
DoS attack rocks Palestine, cuts phones, internet