Console hacker DDoS bot runs on lame home routers Console DDoSers Lizard Squad are using insecure home routers for a paid service that floods target networks, researchers say.…
Continued here:
Router creds admin/admin? Lizard Squad thanks you
Console hacker DDoS bot runs on lame home routers Console DDoSers Lizard Squad are using insecure home routers for a paid service that floods target networks, researchers say.…
Continued here:
Router creds admin/admin? Lizard Squad thanks you
Technological advances related to computing and the Internet have affected every one of us. The Information Revolution that the Internet has made possible is affecting society just as dramatically as the Industrial and Agricultural Revolutions of the past, but there is an unpleasant side to progress. Criminal use of the Internet, or hacking, is an unavoidable part of information technology development. Hackers have gained unauthorized and undesirable access to information, sometimes with far-reaching consequences. Innovations in hacking have in turn led to the development of protection methods and devices commonly known as web application firewalls (WAF) . An application firewall is a form of firewall which controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet the configured policy of the firewall. A Web Application Firewall does much more than a consumer’s computer firewall. Consumer-level applications work by blocking software access to certain ports. Web applications such as Apache, WordPress and Microsoft’s Office all require an extra level of protection against malicious users. WAFs offer this extra protection and work by analyzing all data passing through them and checking its conformity to pre-set rules. A WAF fulfills a web-user’s need to protect both internal and public web applications, whether locally (on-premises) or remotely (cloud-hosted), against unauthorized access attempts. These attacks revolve around hacking and illegal access to web applications. According to statistics, every year, cyber attacks are increasing by 30%, while successful breaches are increasing at twice that rate, 60% a year: In plain English, more attacks are getting through. Basic consumer-level cyber security measures are essential and are an urgent call on companies’ financial resources, but these are not enough. If a company has a website then that website must be protected using a WAF against unauthorized intrusion by hackers. The need to protect customers’ data is even more important than the need to keep the website live. If there is a security breach the negative effects of the attendant publicity and loss of trust are immeasurable. So how have application firewalls been evolving? Web application firewalls have been evolving rapidly and becoming more sophisticated with the objective of protecting websites and customer data from increasingly sophisticated attacks and unauthorized access. Hackers’ methods have become more devious and WAF sophistication has increased correspondingly as part of the information security industry’s fight back against criminals stealing data and malicious hacking. The more evolved and developed WAF solutions are capable of preventing attacks and unwanted intrusion on any website. Modern web application firewalls generally have default settings that give no false negatives and errors and all modern WAFs are designed to work perfectly without the need for any user knowledge of source code. A WAF has become crucial in detecting and preventing any attack that that is masquerading as network access by a legitimate user. Understanding interactions Web Application Firewalls need to do much more than just see the code: They need to be able understand every line of code passing through them and to evaluate any risk that it represents. This risk evaluation ability enables a WAF to analyze visitors based on reputation behaviors. The old adage of prevention being the best cure still holds true and is very relevant here. Instead of blocking an attack as and when it occurs, a WAF should see it coming by understanding and tracking visitor behavior. It should be proactive. More than In-Depth Inspection From the historical perspective of web application firewalls, they have always performed an in-depth inspection of any access routes to the protected sites. However, the modern evolution of web application firewalls comes with more than in-depth inspection of access routes in the sense that modern WAFs are deployed in-line in the form of reverse proxies. These are crucial in preventing any form of access log collection that may be used later to audit the protected site or perform any form of analysis on the protected web applications. Simplicity of use is vital, so the modern web application firewall has evolved to the extent that it can be deployed out of the box with no user setting changes necessary. New-age WAFs such as those from the aforementioned Incapsula are constantly learning and are able to stop threats that have never been seen before by analysis of their code and finding similarities to previous threats. They are updated frequently and monitoring is available on some plans to ensure maximum protection for your site and your customers. Modern firewalls have enabled an increase in firewall features that revolve around transparent proxy and bright modes, which can enable WAFs to easily integrate with other network security technologies such as vulnerability scanners, protection applications, distributed denial of service prevention, database security solutions, and web fraud detection. Another major noticeable evolution has to do with the fact that modern WAFs are perfectly packaged to include content caching, as well as web access management modules, which are specially designed to provide simple sign-in features, especially for distributed web applications. Concluding thoughts There are massive advances going on in the field of web application firewalls. Modern firewalls are perfectly devised to provide maximum protection against hacking, easy detection and filtering of both known and unknown threats, while at the same time, minimizing false alerts. Are you aware of the level of protection that your web application firewall offers? Does it protect you against a DDOS attack? Does it protect your customers’ login and credit card details adequately? Source: http://tech.co/evolution-web-application-firewalls-2015-01
Visit site:
The Evolution of Web Application Firewalls
When the Sony Playstation and Microsoft Xbox Live gaming networks went down over Christmas and were kept offline for several days afterwards, the hacker collective that calls themselves LizardSquad to…
View the original here:
LizardSquad's DDoS service is powered by hacked home routers
Hacker group Anonymous has vowed to avenge those killed in the deadly attack on the offices of French satirical magazine Charlie Hebdo by taking down jihadist internet sites and social media accounts. In a video uploaded to the Anonymous Belgique YouTube channel, a figure wearing the group’s signature Guy Fawkes mask condemned the attack that killed 12 individuals, which includes eight journalists. The video description addresses the message to “al-Qaeda, the Islamic State and other terrorists.” “We are fighting in memory of these innocent people today who fought for freedom of expression,” stated the disguised person in the video. The group integrated a link to anonymous data sharing internet site Pastebin with a list of Twitter accounts it claims are linked to jihadists. The group is using the hashtag #OpCharlieHebdo to urge other customers to assistance them take down the accounts by reporting them to Twitter, or participating in a Distributed Denial of Service (DDoS) attack – a practice normally used by the hacker group. “Anonymous should remind each citizens (sic) that the press’s freedom is a fundement of the democracy. Opinions, speech, newspaper articles with no threats nor pressure, all these issues are rights you can’t modify,” read a statement posted to Pastebin by the group Thursday. “Expect a massive reaction from us, simply because this freedom is what we’ve been often fighting for.” Read A lot more: Each ‘Charlie Hebdo’ suspects killed as police storm constructing Wednesday’s attack in Paris has not been linked to ISIS – numerous reports have suggested it is much more most likely to be connected to the Yemen-based al-Qaeda in the Arabian Peninsula. On Friday, Charlie Hebdo suspects Cherif Kouachi, 32, and Stated Kouachi, 34, had been killed just after police stormed the constructing exactly where they were holed up for extra than five hours. The third suspect Hamyd Mourad, 18, surrendered to police early Thursday. Source: http://www.finditwestvalley.com/world/anonymous-vows-to-take-down-jihadist-websites-to-avenge-8216charlie-hebdo8217-victims-h46362.html
Read More:
Anonymous vows to take down jihadist websites to avenge ‘Charlie Hebdo’ victims #OpCharlieHebdo
Akamai today released its latest State of the Internet report, which provides insight into key global statistics such as connection speeds and broadband adoption across fixed and mobile networks, over…
Read More:
State of the Internet: Attack traffic, DDoS, IPv4 and IPv6
The new year started poorly for Finnish bank OP Pohjola Group and its customers: the latter have been prevented from executing their online banking transactions by a DDoS attack that targeted the bank’s online services starting on the last day of 2014. “OP’s services experienced some problems on New Year’s Eve due to data communications disruptions. The disruptions were caused by a denial-of-services attack. The attack flooded OP’s data communications systems and prevented customers’ banking. During the disruption, online services were not available and cash withdrawals could not be made from ATMs. There were also some difficulties in card payments,” the bank shared on the second day of the attack. “The disruption was detected at about 16.30 on New Year’s Eve. The services started to function again at times and were completely restored and available to customers after midnight. Nevertheless, further disruptions are possible as the corrective measures are still ongoing and the security level of data traffic has been raised for the time being. Customers abroad may still have difficulties in logging in to OP’s online services.” The attack is still ongoing, and OP’s services were not the only target. The Finnish division of the Nordea bank and the Danish Danske Bank have also experienced online service slow-down or disruption. While the latter is yet to comment on the matter, Nordea has confirmed they have been targeted by unknown DDoS attackers and have called in the police to investigate. The cause of the attack is still unknown, they said. Nordea’s customers were still able to use the online banking service, but the service was slowed down. OP Pohjola Group’s customers, on the other hand, were unable to use the service altogether for many hours during the last six days, as the bank managed to restore it occasionally. They, along with its service company Tieto, are cooperating with the authorities and investigating the attack. In the meantime, the bank has set up a telephone service number that can be used by customers who cannot access their online services and have urgent banking business. They have also pledged to compensate customers for any fees they many have incurred and losses they may have suffered as a result of their inability to access the bank’s online services during the attack. Source: http://www.net-security.org/secworld.php?id=17785
Read this article:
Scandinavian banks hit with DDoS attacks
The Crunchyroll streaming service announced on Tuesday that it is currently down due to a Distributed Denial of Service (DDoS) attack “of the same magnitude” as those recently targeted towards Sony and Microsoft consoles . Crunchyroll service went down at approximately 4:00 a.m. EST on Tuesday. DDoS attacks against Sony and Microsoft started on Christmas Day and made services on Xbox One and PlayStation 4 consoles unavailable for approximately three days. A hacking group known as Lizard Squad claimed responsibility for the attacks. Crunchyroll has over 400,000 reported paid subscribers. Source: http://www.animenewsnetwork.com/news/2014-12-30/crunchyroll-streaming-service-down-amid-ddos-attack/.82769
Read the original post:
Crunchyroll Streaming Service Down Amid DDoS Attack
The official website of the Swedish Parliament was taken down on Tuesday, in what officials labelled “an outside attack”. The website, riksdagen.se, was taken down at 11am on Tuesday, with visitors met by a blank screen. By 2pm, the website was up and running again, but officials confirmed that the problem had not been caused by any internal IT troubles. “It went down because of an attack from the outside,” Riksdag spokesperson Anna Olderius told the TT news agency. “But we refuse to comment on security issues in any more detail than that.” The cyber attack marks the second against the website in the past two years. In October 2012, the website went down together with that of the country’s central bank other government websites, news networks, and university home pages. Hacktivist network Anonymous claimed responsibility for the October attacks. “You don’t fuck with the internet,” the group wrote online, in what was apparently a response to police raids on the previous hosts to The Pirate Bay and WikiLeaks. The attacks were carried out via a Distributed Denial of Service (DDoS), where a website is bombarded with communication requests so that the servers become overloaded and the site crashes. As yet, no one has claimed responsibility for Tuesday’s attack. Source: http://www.thelocal.se/20141230/cyber-attack-hits-government-website
See more here:
DDoS attack on Swedish Parliament’s website
Malefactors turned festivities into a turkey for online gamers Sony has blamed distributed-denial-of-service (DDoS) attackers for causing PlayStation’s network to go titsup on Christmas Day.…
Originally posted here:
Sony FINGERS DDoS attackers for ruining PlayStation’s Xmas
For the first time in days, Sony has issued a formal response to the ongoing distributed denial-of-service (DDoS) affecting various networks in the gaming industry, including PlayStation Network. While the update doesn’t offer much in terms of when PlayStation owners can expect full service to resume, Sony has at least assured us that they are working to restore full network access. Note: An update on Sony’s official support page notes that service is restored on PS3 and Vita; however, PSN is still down on PS4. A special section of the website is dedicated to PSN post-restoration that says if you are continuing to experience problems after PSN services are fully restored to refer to Contact Support. Here’s the full message from Catherine Jensen, VP of SCEA Consumer Experience. The video game industry has been experiencing high levels of traffic designed to disrupt connectivity and online gameplay. Multiple networks, including PSN, have been affected over the last 48 hours. PSN engineers are working hard to restore full network access and online gameplay as quickly as possible. From time to time there may be disruptions in service due to surges in traffic, but our engineers will be working to restore service as quickly as possible. If you received a PlayStation console over the holidays and have been unable to log onto the network, know that this problem is temporary and is not caused by your game console. We’ll continue to keep you posted on Twitter at @AskPlayStation and we’ll update this post once the problems subside. Thanks again for your patience. The DDoS attacks on PSN (and Xbox LIVE) began around Christmas Day. Though neither Sony nor Microsoft admitted to being DDoS’d, the notorious hacker group Lizard Squad was eager to claim credit. For those unfamiliar, this is the same group that launched multiple attacks earlier this year, including bomb threats to SOE president John Smedley. On Friday, one of the numerous Twitter accounts claiming to be Lizard Squad said the DDoS attacks were stopped and that any ongoing disruptions were “just the aftermath” of hours worth of traffic bombardment. However, another account claiming to be one of the prominent members of Lizard Squad, continued to tweet out messages suggesting the DDoS attacks were continuing. Even now, two days after Christmas, PSN is still struggling to return to full service; although, some believe it to be Sony simply restructuring its system architecture. At this point it’s still not 100 percent certain if the outages are ongoing DDoS attacks, but it appears for now at least that Sony has a grasp on the problem and is working to restore service. Hopefully they are addressing the issues and even working to prevent this sort of thing from happening in the future. Considering this isn’t the first time PSN has been brought down for a lenghty period, I’m hoping Sony will finally take some serious action in preventing this sort of outage again. But, I’m also skeptical; if they haven’t learned by now, when will they? Source: http://www.gamezone.com/news/sony-issues-formal-response-to-ddos-attacks-in-psn-update-9048-jrni
View original post here:
Sony issues formal response to DDoS attacks in PSN update