Category Archives: Security Websies

British student found guilty of Anonymous PayPal Distributed Denial of Service (DDoS) Attacks

A British student has been convicted over his role in a series of denial of service attacks against PayPal, which cost the payment firm £3.5m. Christopher Weatherhead was part of an Anonymous gang that attacked PayPal in protest at the firm’s decision not to handle payments being made to whistle-blowing website Wikileaks, in an attack dubbed ‘Operation Payback’. According to multiple reports, the jury hearing the case took little more than two hours to reach their guilty verdict. Three other members of the gang had already pleaded guilty but Weatherhead had argued he had not taken part in the attacks, claiming his role had been limited to operating Anonymous chat rooms. The judge presiding over the case, Peter Testar, told the defendants that he regarded the offences as serious. Weatherhead, who was a student at Northampton University at the time of the attacks, was found guilty under the Criminal Law Act 1977, and could face jail time as a result of the guilty verdict. The Metropolitan Police arrested five youths in 2011 in connection with Operation Payback, while other suspected members were arrested by the Dutch authorities. Operation Payback had initially begun as a protest against the music industry’s anti-piracy stance, but the focus changed after Wikileaks published a series of leaked diplomatic memos. Several financial services firms including PayPal, MasterCard and Visa withdrew services from Wikileaks, and as a result drew the ire of the Anonymous activists. Source: http://www.v3.co.uk/v3-uk/news/2230251/british-student-found-guilty-of-anonymous-paypal-ddos-attacks

Link:
British student found guilty of Anonymous PayPal Distributed Denial of Service (DDoS) Attacks

Gameover gang uses Cutwail botnet to swell its own

The hackers behind the Gameover variant of the popular Zeus banking Trojan have rented the massive Cutwail botnet in order to send out millions of fake emails carrying the malware, warns Dell SecureWo…

See more here:
Gameover gang uses Cutwail botnet to swell its own

Distributed Denial of Service ‘DDoS’ Attacks From Anonymous Cost PayPal £3.5 Million of Damage

The distributed denial of service attack (DDoS) from hacktivist Anonymous has cost PayPal more than  €4.3 million . The attack which was named Operation Payback  were initially aimed at companies that opposed internet piracy, but switched to companies like Mastercard, Visa and PayPal after they refused to process payments to WikiLeaks . After that attack PayPal -the global leader in online money transfer and payments has paid around £3.5 million defend and arm itself against such kind distributed denial-of-service (DDoS) attacks. In a report BBC said that more than one hundred skilled employees from eBay, PayPal’s parent company, spent almost three weeks working on DDoS-attack-related issues and that PayPal had bought software and hardware to defend itself against further attacks. In all, the total cost of this work came to £3.5 million. This details have been revealed in a court case at Southwark Crown Court where a defendant, Christopher Weatherhead (studying at Northampton University when who allegedly took part in the campaign), is facing charges of conspiring to impair the operation of computers. He has pleaded not guilty to conspiring to impair the operation of computers between 1 August 2010 and 22 January 2011. Sandip Patel , prosecuting, said the group caused PayPal “enormous economic harm” . Mr Patel said they used distributed denial of service, or DDoS, which flooded the targets computers with enormous amounts of online requests. Target websites would crash and users would be directed to a page displaying the message: “You’ve tried to bite the Anonymous hand. You angered the hive and now you are being stung.” Mr Patel said: “This case, simply put, is about hackers who used the internet to attack and disable computer systems – colloquially described as cyber-attackers or vandals.” He said Mr Weatherhead, who used the online name Nerdo, posted plans on an Internet Relay Chat (IRC) channel encouraging an attack on PayPal. He said PayPal was the victim of a series of attacks “which caused considerable damage to its reputation and loss of trade”. Source: http://www.voiceofgreyhat.com/2012/11/DDoS-Attack-From-Anonymous-Cost-PayPal-3.5-Million.html?utm_source=dlvr.it&utm_medium=identica

Continue Reading:
Distributed Denial of Service ‘DDoS’ Attacks From Anonymous Cost PayPal £3.5 Million of Damage

What to Do About Distributed Denial of Service ‘DDoS’ attack

Leaders at four security technology companies say the distributed-denial-of-service attacks that have hit 10 U.S. banks in recent weeks highlight the need for new approaches to preventing and responding to online outages. “Attackers have broadened their toolkits, and DDoS is a not just a blunt instrument anymore,” says Jason Malo , a fraud analyst CEB TowerGroup and former DDoS-prevention expert for domain-naming-system registry operator VeriSign. These experts advise banking institutions to: Use appropriate technology, including cloud-based Web servers, which can handle overflow, when high volumes of Web traffic strike; Assess ongoing DDoS risks, such as through tests that mimic real-world attacks; Implement online outage mitigation and response strategies before attacks hit; Train staff to recognize the signs of a DDoS attack. During a DDoS attack, a website is flooded with what security experts often call “junk” traffic – a saturation of requests that overwhelm the site’s servers, preventing them from being able to respond to legitimate traffic. In essence, DDoS attacks take websites down because the servers can’t handle the traffic. Security experts interviewed for this story say most banks have failed to address this vulnerability to high volumes of traffic. DDoS: Banks on Alert Starting in mid-September, DDoS attacks have resulted in online outages at 10 major U.S. banks . The hacktivist group Izz ad-Din al-Qassam Cyber Fighters has taken credit for the hits, saying the attacks are motivated by outrage related to a YouTube movie trailer deemed offensive to Muslims. But security experts say DDoS attacks are often used as tools of distraction to mask fraud in the background (see DDoS Attacks: First Signs of Fraud? ). To reduce their risk of DDoS takedown, experts say banks need to address three key areas: Layered user authentication at login, which consumes bandwidth; Reliance on Internet service providers not equipped to handle extreme bandwidth demands; and The internal management of Web servers, which limits banks’ ability to hand off traffic overflow when volumes are excessive. Expert Advice Fraud should always be an institution’s top concern, meaning addressing DDoS threats should be a priority, experts say. “DDoS protections have quickly become a new industry best practice,” Malo says. But DDoS attacks pose unique challenges for banks and credit unions. The additional layers of security institutions already implement, such as enhanced user authentication, transaction verification and device identification , demand more bandwidth. So when a bank is hit by a DDoS attack, bandwidth is strained more than it would be at a non-banking e-commerce site, says Mike Smith, a senior security evangelist at Akamai Technologies, which specializes in Internet traffic monitoring and cloud-based DDoS protections (see New Bank Attacks Expected Today? ). So what protections make sense? BankInfoSecurity asked security vendors VeriSign, Prolexic, Cisco and Akamai Technologies for their top recommendations. They all stressed that no one-size-fits-all approach to thwarting attacks exists. Nevertheless, they identified several best practices. Use Appropriate Technology When it comes to selecting the right technologies to minimize DDoS-related outages, vendors advise: Rely on the cloud. No internal server could be expected to handle the amount of traffic these recent DDoS attacks have pushed. Akamai’s Smith says the average amount of traffic coming in during some of those individual attacks equaled about 65 gigabytes per second. “Even at the height of the Anonymous attacks, we saw traffic coming in from 7,000 or 8,000 people [at approximately 1 gigabyte per second],” he says. By relying on cloud-based servers and systems, banks can expand their bandwidth. “It’s never a good idea to manage everything internally,” says Joe Dallatore, senior manager of the Cisco Security & Research Information Group, which specializes in security threat monitoring and online event tracking. Working with a cloud vendor also can help institutions more readily identify a DNS-server attack or other DDoS attack, Dallatore says. Using DNS providers with the capacity to absorb an attack makes sense, because when DNS fails, all other services fail, says Akamai’s Smith. “This is why almost all the large banks use a DNS provider in some capacity, and it’s a proactive defense that is always turned on by default,” he adds. Use virtual private networks. VPNs indirectly improve DDoS protections, says Matt Wilson, who oversees strategic technologies at VeriSign. Attackers target publicly available sites because they are public. But a VPN cannot protect an entire infrastructure. For complete protection, banks and businesses must continue to rely on other technologies for firewall management as well as server and router maintenance, he says. A better solution, Akamai’s Smith suggests, is VPN over MPLS [multiprotocol label switching] for critical or business-to-business functions. Apply challenge-and-response. Malo says banks should encourage vendors to develop DDoS protections that “challenge” traffic. These protections, he says, could mirror challenge-and-response options, such as CAPTCHA images, used for online banking. A CAPTCHA image uses distorted letters or numbers that an online user is required to enter at login to help affirm authenticity. “DDoS mitigation is not just about finding a signature and putting mechanisms in to filter or block traffic,” Malo says. “Mitigation also includes introducing challenge-response.” Challenge-and-response options would help banking institutions differentiate legitimate traffic from so-called junk traffic often associated with DDoS attacks, he adds. But Akamai’s Smith warns that challenge-and-response during a large DDoS attack could be dangerous, since challenge-and-response takes one request and turns it into four. “This does not scale, and it sets you up for additional points of failure.” he says. For smaller attacks, challenge-and-response can be effective, however, “where we are worried about denying legitimate users because of mega-proxies, corporate Internet access points,” Smith says. Don’t rely on intrusion detection. Intrusion prevention and detection systems can be effective at picking up on anomalous traffic or behavior associated with a DDoS attack, CEB TowerGroup’s Malo says. But that’s not what those systems were primarily designed to do. While leaning on those systems can help DDoS detection, and in some cases help institutions thwart online outages, redirecting IPS and IDS can create new vulnerabilities. “When protection systems are redirected, banking institutions inadvertently create new vulnerabilities,” he says, because other defenses are weakened. Scrub. Traffic scrubbing, which clears suspected botnets and junk traffic at the ISP, can be effective, Cisco’s Dallatore says. The more bad traffic an institution can block at the outset, the better its chances of limiting an outage. Assess DDoS Risks Vendors stress that regularly assessing DDoS risks, such as through tests that mimic real-world attacks, is essential. “Run periodic table-top exercises to model how an attack could hit and then test the accompanying remediation strategies you’ve put in place,” says Stuart Scholly, president of Prolexic, which specializes in cloud-based services for website restoration after a DDoS attack. To set the stage for remediation plans and testing, vendors recommend banking institutions first: Know typical traffic patterns. To better assess risk, financial institutions must carefully determine what typical site traffic looks like, Malo says. That way, when a DDoS attack hits, atypical traffic patterns are more obvious. Understand the infrastructure. Understand the Web applications, online bandwidth limits and any infrastructure elements that could affect site capacity. Akamai’s Smith says network segmentation can limit the impact an attack has on other services inside the same infrastructure. “At a minimum, critical sites should be provisioned onto their own, dedicated network circuits and border devices to limit the impact of both an attack against them and from attacks against other services in the same data center,” he says. “Brochureware sites,” consumer transactional sites and business sites are good candidates to break out into their own infrastructure, Smith says, while redirect, typo and marketing-campaign sites can be run from shared infrastructure. Mitigation and Response DDoS mitigation strategies and response plans should be included in disaster recovery and business continuity strategies, Prolexic’s Scholly says. Those strategies also must include definitive communication and action plans, Cisco’s Dallatore says. Communicating with employees and the public soon after a DDoS attack is critical for reputational preservation. “You want to be sure operational people, for instance, can reach the decision makers or have the authority to make decisions when a site goes down,” Dallatore says. During the recent wave of attacks, banks’ communication with the public varied. Some institutions acknowledged their sites went down because of DDoS attacks, while others only said their sites experienced intermittent outages. Greg Nowak of the Information Security Forum says most institutions have been too quiet – fueling the public’s fears about the outages. “They seem to be regarding it as a secret,” Nowak says. “[The banks] should be taking the opportunity to explain to their customers the difference between a denial-of-service attack and some sort of hacking attack that actually puts information at risk.” Provide Training Training staff to recognize the signs of an attack is essential, vendors advise. Bank and credit union employees must understand what DDoS attack traffic patterns look like, says Prolexic’s Scholly. Front-line staff members also need to know how to respond if they start getting calls about a site being down. BITS , the technology division of the Financial Services Roundtable, says banks and credit unions need to clearly communicate with customers and members that their financial information and accounts are secure. Among BITS recommendations: Explain that attacks have not resulted in unauthorized access to customer information; Reiterate to consumers that banking institutions use sophisticated online security strategies to protect customer accounts; Let consumers know that institutions continue to invest in technology to defend against potential attacks. “We want the public to know that institutions are taking steps to address these attacks – with ISPs and other security providers – and there is a fair amount of collaboration going on with regulators and the Department of Homeland Security about the threats and how to address them,” says John Carlson, executive vice president of BITS. “You can’t underestimate the importance of training, and the role it plays in your business continuity planning,” Scholly says. “When you are prepared, it makes a world of difference.” Source: http://www.bankinfosecurity.com/what-to-do-about-ddos-attacks-a-5271/p-3

View article:
What to Do About Distributed Denial of Service ‘DDoS’ attack

Life cycle and detection of an exploit kit

As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own nature means even non-tech…

See the original article here:
Life cycle and detection of an exploit kit

Distributed Denial of Service ‘DDoS’ attack and SQL injection are the most popular attack subjects

An analysis of conversations in one of the largest known hacker forums – with around 250,000 members – has revealed that SQL-injection and DDoS are the subjects of most interest to up-and-coming wannabe hackers. In its analysis of the forum (together with 17 other, smaller forums) to be published today, Imperva notes that this “is not a hardcore crime site, but it’s not entirely softcore. New hackers come to this site to learn and, on the other hand, more experienced hackers teach to gain ‘street cred’ and recognition… Typically, once hackers have gained enough of a reputation, they go to a more hardcore, invitation-only forum.” The real value of the analysis is that it shows what tomorrow’s hackers are learning today. “By examining what information hackers seek out or share in these forums, we can better understand where they are focusing their efforts,” explained Amichai Shulman, Imperva’s CTO. It seems that DDoS and SQL injection attacks are the current focus. Each tied at 19% of all discussed attack methodologies. DDoS is rarely out of the news, with hacktivists using it to make political protests, criminals using it to disguise other attacks, and (potentially) nation states using it to disrupt critical infrastructures. The recent spate of attacks against American banks is thought by many to be a politically-inspired attack by Iranian attackers. SQL injection attacks have a slightly lower profile but are similarly popular with criminals – and the same US banks have recently been warned about Havij, an automated SQL injection attack tool (itself a common subject of discussion in the chat forums). Such attacks can be mitigated (and Imperva has discussed this in an earlier blog this month). Nevertheless, the company believes that only 5% of industry’s current security budget is spent on defeating this type of attack; which may help explain why it is so popular. Other subjects disclosed by the Imperva analysis include the growing black market for social media endorsements, especially likes on Facebook and followers on Twitter. Since the social media sites are becoming better at recognizing and excluding automated bots that accrue such ‘currency’, the underground is providing it as a service, with numerous advertisements for buying or selling “illegitimate social network likes, followers, and endorsements” appearing on the forums. But there are also many discussion threads, says Imperva, that include “requests to hack someone’s Facebook profile, usually to settle personal matters. Common examples are spying on one’s girlfriend/ex, taking revenge, and just for lulz.” E-whoring has also become rampant. “With more than 13,000 threads in the dedicated forum we monitor, e-whoring is surely becoming one of the most common methods for beginner cyber criminals to gain easy money.” It’s basically social engineering where an attacker of either sex pretends to be a ‘hot gal with pics’. Dj Co2 posted an explanation on Black Hat World last month: “So what you will be doing is making a girls profile, add some hot pictures and make it look real. You will then be sending messages to different guys (there’s no limit on that). You will then chat with them, make them a little horny and desperate and then get them to sign up through your affiliate link to some webcam site. Tell them that if they buy tokens they can have a private chat with you on the website… 20 Instagram accounts with profile picture for $10.” “The victim,” says Imperva, “is paying for the illusion of a brief relationship.” Men “would be better off getting to know the girl next door,” it suggests. For more information on SQL injection click here . Source: http://www.infosecurity-magazine.com/view/29033/ddos-and-sql-injection-are-the-most-popular-attack-subjects

Read More:
Distributed Denial of Service ‘DDoS’ attack and SQL injection are the most popular attack subjects

Anonymous hacks police forum, sends emails to police officers

Anonymous is mostly known for their real-life and online protests, DDoS attacks, and shaming of businesses and government organizations by publicly releasing confidential data stolen from their server…

See more here:
Anonymous hacks police forum, sends emails to police officers

Use Cloud to Repel Distributed Denial of Service ‘DDoS’ attack

Employing cloud computing services could help organizations defend against the type of distributed denial of service attacks that have temporarily crippled the online service of major American banks, says NIST’s Matthew Scholl. By using cloud computing services, Scholl says in an interview with Information Security Media Group, enterprises no longer are completely dependent on their own physical infrastructure because they can add processing capabilities from the cloud to keep up with DDoS attacks. “You have an entire cloud infrastructure that you can spin up and provision to keep pace with the scale of the attack. And when the attack subsides, then you can drop an infrastructure back down again and just pay for that service that you needed when the attack occurs,” says Scholl, deputy chief of the National Institute of Standards and Technology’s computer security division. “We’ve seen use of cloud and the elasticity and the dynamic nature of cloud technology to be something that is kind of changing the economics of a DDoS attack.” In the interview, Scholl explains: Why he believes the recent DDoS attacks against banks may not be as dire as they appear [see Bank Attacks: What Have We Learned? ]; How the migration to IPv6 could help organizations can defend against DDoS attacks; Types of guidance NIST offers that could help organizations develop plans to handle DDoS attacks. Scholl says DDoS attacks won’t vanish anytime soon, but believes a government-industry partnerships could help diminish the impact of these digital assaults. “That’s going to be the solution to try to both enable us to defend against it on the organizational side and remove the capability of it at the threat side,” he says. Source: http://www.bankinfosecurity.com/interviews/nist-use-cloud-to-repel-ddos-attacks-i-1698

See more here:
Use Cloud to Repel Distributed Denial of Service ‘DDoS’ attack

HSBC Falls in Latest Bank DDoS Attacks, What’s Next?

Capital One, HSBC, Bank of America, Wells Fargo are among the near-dozen financial Websites hit by distributed denial-of-service attacks over the past few weeks. These attacks have disrupted daily operations for banks and made it difficult for customers to take advantage of online banking services. A group calling itself Izz ad-Din al-Qassam Cyber Fighters has claimed credits for most of the incidents and has named the institutions it will target a few days before launching the attacks. Even with the prior warning, Websites of some of the country’s largest firms have been affected: Bank of America, JPMorgan Chase, PNC, U.S. Bank, Wells Fargo, Sun Trust, Regions Financial, Capital One, and BB&T. Capital One Bank was hit with two separate attacks, occurring on Oct. 9 and Oct. 16. HSBC was the latest one to be hit, as its Websites suffered online outages on Thursday.  A different group, Fawkes Security, claimed credit, but it’s not clear at this point whether the HSBC incident was different from the attacks against other banks or not. “This denial of service attack did not affect any customer data, but did prevent customers using HSBC online services, including internet banking,” the bank said in a statement on its Website. What are DDoS Attacks? A group of computers send larger than usual volume of traffic data to Websites to tie up server resources. Websites can’t handle the high volume, either knocking it offline entirely or being available only sporadically. “You can picture a distributed denial-of-service attack as being something like 15 fat men trying to get through a revolving door at the same time. Nothing moves,” said Graham Cluley, senior technology consultant at Sophos. Often in DDoS attacks, the computers used to bombard the targeted Websites with traffic have actually been hijacked. The computers are often infected with malware that give attackers control over the computer, usually without the owner’s knowledge. In these banking attacks, however, it appears that the perpetrators have hijacked servers instead of client machines, according to recent analysis by Radware. Difficult to Repel For banking customers, these DDoS attacks are just more annoying than damaging, While online systems have been intermittently unavailable, to date, it doesn’t appear that any customer or account information at any of the banks have been exposed because of the attacks. For financial institutions, they’ve been highly disruptive, as IT departments have to deal with significantly large attacks. “These are big, but we’ve seen this big before,” said Neal Quinn, chief operating officer of Prolexic, told Wired last week. “We’ve seen events this big in the past.” Even knowing that the attacks were coming, financial institutions have been unable to keep the attacks from knocking the sites offline. Each of the targeted banks experienced several hours of downtime, although Wells Fargo seemed to have weathered the crisis a little better than others. “I don’t want to minimize the potential damage it could cause to the industry,” Wells Fargo CFO Tim Sloan told Reuters, “But in terms of how the industry performed and how Wells Fargo performed in reaction to the recent efforts, we actually performed very well.” The bank will continue to invest in ways to defend against future DDoS attacks, according to Sloan, who called it as “a cost of doing business today.” Stay On Guard Even though each of the affected institutions have assured customers that no customer or account data has been compromised, security experts warn that it’s still too early to get complacent. DDoS attacks can often be a diversion so that IT teams don’t notice other malicious activity that may be happening at the same time. Gartner’s Avivah Litan told Government Info Security that she had anecdotal accounts of fraud slipping through banks’ overloaded call centers while the online channels are under attack. It wouldn’t be the first time DDoS attacks were used to distract overloaded administrators. Back in April 2011, Sony didn’t notice the attackers breaking into Sony servers to compromise over 100 million user accounts from the PlayStation Network, Sony  Online Entertainment, and Qriocity music service because it was distracted by large-scale DDoS attacks overwhelming its servers, the company said in a letter to Congress. “We are assuming that the attackers are doing this to perpetrate fraud,” Mike Smith, a security evangelist with online security provider Akamai Technologies, told Bank Info Security . Smith was specifically referring to the fact that Capital One was targeted for a second time, which may mean that attackers are looking for different ways to try to compromise employees and get access to customer accounts. “That’s the assumption we are operating under at this point,” Smith said. Source: http://securitywatch.pcmag.com/none/304145-hsbc-falls-in-latest-bank-ddos-attacks-what-s-next

See the original article here:
HSBC Falls in Latest Bank DDoS Attacks, What’s Next?

Distributed Denial of Service ‘DDoS’ Attacks Increasing In Number and Intensity

Businesses are seeing an increase of Distributed Denial of Service (DDoS) attacks in comparison to last year, with attacks becoming shorter but more robust, according to a quarterly report released Oct. 16 by DDoS mitigation company Prolexic. During a DDoS incident, an attacker prevents users from being able to access a website. In order to achieve this, he typically uses malware to infect a network of computers, or botnet. The attacker can control the botnet to overwhelm a website with data and requests, forcing it to crash or become slow to the point of being unusable. For businesses, DDoS attacks can be crippling, resulting in a loss in profit or customer service until the website can be restored. Prolexic’s report found DDoS incidents have increased by 88 percent when compared to the same period of time last year. Perhaps more troubling, the incidents are becoming more intense, using higher bandwidth volumes. Prolexic President Stuart Scholly said that on average the company is seeing attacks with a bitrate of 20 gigabites per second or more every eight days. Few enterprises have networks with the capacity to withstand attacks of that size, he added. China continues to be the top source country for attacks, responsible for about 35 percent, with the United States following with 27 percent, the report found. Although the United States was the source country for only 8.76 percent of attacks last quarter, Scholly said the United States is typically the second-ranked source country after China. “Twenty gigs is the new norm,” he said. “There’s no doubt in my mind that that trend continues.” A DDoS toolkit called “itsoknoproblembro” was responsible for the majority of the high bandwidth floods this quarter, the report stated. The toolkit is especially effective because it targets vulnerable servers instead of individual computers, making the botnet easier to control and yielding a higher bandwidth, Scholly said. “What might have taken 50,000 compromised home machines before might only take a couple thousand servers now,” he said. “And it’s easier to coordinate the activities of a couple thousand high capacity machines.” The toolkit has been linked in reports to the suspected attacks on financial institutions during September, but Scholly would not comment on what companies were attacked, citing customer privacy. “What I can tell you is that this toolset is something that we’ve been observing over the years, and we’ve seen it used in multiple sectors,” he said. “It was has by no means been targeted at one individual sector.” Scholly would also not comment on what actors were responsible for the toolkit. Motivation for attacks can vary from state-sponsored activities, competing companies trying to get an economic advantage, or the overloading a server as a means of social protest, he said. Another continuing trend is the growing popularity of shorter attacks, Scholly said. “The more you expose your botnet during an attack, the greater likelihood that you have for someone to start taking it down,” he said. “So you want to accomplish your goal, and then kind of move on.” For DDoS protection against your eCommerce site please contact us . Source: http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?List=7c996cd7-cbb4-4018-baf8-8825eada7aa2&ID=929

View original post here:
Distributed Denial of Service ‘DDoS’ Attacks Increasing In Number and Intensity