Category Archives: Security Websies

Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT

Gets back up again after half an hour though Ello, the social network site intended to serve as something of an antidote to ad-stuffed Facebook, was hit by a suspected Distributed-Denial-of-Service attack today.…

More:
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT

DDoS Attacks Target Online Gaming Sites, Enterprises

DDoS traffic volume was up overall with a third peaking at over 500Mbps and more than five percent reaching up to 4Gbps, according to NSFOCUS. A continuing trend of distributed denial-of-service (DDoS) attacks that are short in duration and repeated frequently has been revealed by the NSFOCUS 2014 Mid-Year Threat report. In parallel, high-volume and high-rate distributed denial of service (DDoS) attacks were on the upswing in the first half of 2014. DDoS traffic volume was up overall with a third peaking at over 500Mbps and more than five percent reaching up to 4Gbps. In addition, findings showed that over 50 percent DDoS attacks were above 0.2Mpps in the first half of 2014, increasing from around 16 percent. More than 2 percent of DDoS attacks were launched at a rate of over 3.2Mpps, according to the report. “The DDoS attack is a relatively easy attack method to be employed with noticeable effects among other network attacks. When online service is stopped, the impact and damage it causes is very apparent and straightforward,” Xuhua Bao, senior researcher at NSFOCUS, told eWeek. “Attacks with high frequency make it hard for attack’ targets to respond to instantly, increasing the difficulty of the defense level.” The longest single attack lasted nine days and 11 hours, or 228 hours, while the single largest attack in terms of packet-per-second (pps) hit at a volume of 23 million pps. More than 42 percent of attack victims were targeted multiple times while one in every 40 victims was repeatedly hit more than 10 times. The highest frequency of attacks experienced by a single victim was 68 separate DDoS attacks. “Today, DDoS attack methods have become highly instrumental and resourceable. When an attacker plans to launch a DDoS attack on a specific target, there are plenty of DDoS attack tools and resources available online to be purchased and used,” Bao said. “With the rise of hacktavism in recent years, DDoS attacks have become a means of protesting or expressing your own opinion, which is widely used by some hacker groups.” The report revealed HTTP Flood, TCP Flood and DNS Flood were the top three attack types, together making up 84.6 percent of all attacks. DNS Flood attacks held their place as the most popular attack method, accounting for 42 percent of all attacks. While the number of DNS and HTTP Flood attacks decreased, TCP Flood attacks grew substantially. More than 90 percent of attacks detected lasted less than 30 minutes, an ongoing trend the report said indicates that latency-sensitive websites, such as online gaming, e-commerce and hosting service should be prepared to implement security solutions that support rapid response. The survey also indicated an increase in Internet service providers (ISPs), enterprises and online gaming sites as targets. Attacks targeting ISPs increased by 87.2 percent, while attacks on enterprises jumped by 100.5 percent and online gaming by 60 percent. “The online gaming industry has been a target of DDoS attacks and are mainly profit-driven. The nature of online gaming relies greatly on the Internet service and often there is a huge amount of money involved making them extremely sensitive to attacks,” Bao said. “When they are being attacked, there are obvious and direct economic losses, as well as the loss of the resources from players, which leads to malicious competition and extortion.” Source: http://www.eweek.com/small-business/ddos-attacks-target-online-gaming-sites-enterprises.html

See the article here:
DDoS Attacks Target Online Gaming Sites, Enterprises

Bad boy builds beastly Bash bug botnet – boxen battered

DDoS zombie army found in the wild hours after flaw surfaces Mere hours after its discovery, the Shell Shock Bash vulnerability was exploited by an attacker to build a botnet.…

See the original post:
Bad boy builds beastly Bash bug botnet – boxen battered

Mitigations for Spike DDoS toolkit-powered attacks

Akamai Technologies released, through the company's Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory that alerts enterprises to a high-risk threat of powerf…

Originally posted here:
Mitigations for Spike DDoS toolkit-powered attacks

Hackers Target Destiny and Call of Duty Servers with DDoS Attack

This past weekend, several servers for Destiny went down, both on PlayStation and Xbox, following a DDoS attack. Players were booted from the servers in the middle of the game and an error message read “Cattle” on the disconnect screen. The Lizard Squad hacker group claimed responsibility for sporadic DDoS attacks on the Destiny and Call of Duty: Ghost servers. They posted about their endeavors on their Twtiter account, bragging about taking down parts of both servers. Access has since been restored and players can once more return to their games. Understandably, players had been quite upset about their game time being cut short, especially during a weekend, and many have threatened to ask for their money back, thinking that it was a technical issue from Bungie. “Destiny is currently experiencing issues matchmaking and login across all platforms. We are actively investigating this issue,” Bungie wrote on Twitter, although the message was later deleted by the company. The attack comes after another one from August, when the PlayStation Network, Battle.net, and other online games have been targeted. It’s also when the flight carrying John Smedley, the Sony Online Entertainment president, was grounded after the same hackers issued a bomb threat via Twitter. The attacks indicate that the Lizard Squad hasn’t disbanded and ceased its activities, as it was rumored earlier this month. The group’s website continues to be down, however, for unknown reasons. Source: http://news.softpedia.com/news/Hackers-Target-Destiny-and-Call-of-Duty-Servers-with-DDoS-Attack-459494.shtml

Excerpt from:
Hackers Target Destiny and Call of Duty Servers with DDoS Attack

Struggles with iOS 8 upgrades, traffic surges mimic DDoS attacks

Users upgrading devices to iOS 8 are struggling with long waits – while networks are being flooded by traffic (NASDAQ:AAPL, NASDAQ:AAPL) Apple users are frustrated with difficulty in upgrading to iOS 8, as download times are painfully long. To make matters worse, some networks are being slammed by so much traffic, it’s almost like they are under distributed denial-of-service (DDoS) attack. Networking company Procera Networks found one CIS mobile network that saw its network traffic jump an incredible 4000 percent than normal – an astronomical traffic amount for non-video applications. Everything from Apple’s iPhone models to its smartwatch were criticized – but anytime there is a new iOS release, Apple fans quickly flock to download the latest operating system. However, after just a few days, adoption for iOS 8 has been slower than that of iOS 6 or iOS 7, according to analysts. The iOS 8 upgrade requires 5.8GB of storage space, forcing some users to delete photos, videos, and other data to free up space to upgrade. Source: http://www.tweaktown.com/news/40240/struggles-with-ios-8-upgrades-traffic-surges-mimic-ddos-attacks/index.html

Continued here:
Struggles with iOS 8 upgrades, traffic surges mimic DDoS attacks

The Escapist #GamerGate Forums Brought Down In DDoS Attack

Earlier this week, Milo Yiannopoulos of Breitbart London published an article containing emails between a group of video game journalists, all members of an email list called GameJournoPros. The Breitbart piece suggested collusion between these journalists to provide a specific spin on news during the early days of the Zoe Quinn scandal, which has now blossomed into the broader #GamerGate movement, and to clamp down on discussion of the topic across sites and forums. Yiannopolous also published the full exchange of emails, which provided a more nuanced look at the situation. In the emails various game writers discuss the Quinn scandal and how to approach it. Some suggest sending a note of solidarity, while others push back against this idea, citing the need for professional distance between journalists and their subjects. All told, it appears to be a largely civil conversation between professionals. But two moments in the thread ought to raise eyebrows. In one, writer Ryan Smith asks questions about where other writers and publications draw the line on writing about the private lives of subjects. He is quickly shouted down. More important is an exchange between Polygon writer Ben Kuchera and The Escapist’s Editor-in-Chief Greg Tito. Kuchera urges Tito to shut down The Escapist forum where the discussion of Quinn was occurring, but Tito refuses, arguing that a place for discussion is a healthy thing. “The conversation may be distasteful to some of us,” Tito writes in response to Kuchera and others, “but I don’t know if the answer is to delete the thread. The Escapist is not giving harassment a home, but allowing civil discussion on a matter that people are emotional about.” Since these emails took place, #GamerGate has been born and even the release of Bungie’s popular video game  Destiny hasn’t dampened the voices on both sides. However, it appears that many forums where discussion of #GamerGate has been occurring have been clamping down. Both reddit and 4chan have been banning users and shutting down forums related to the topic. One of the only places outside of Twitter where any discussion has been occurring has been at The Escapist. This morning The Escapist came under a DDoS (denial of service) attack, according to the co-founder and GM of the site Alexander Macris. “A DDOS attack is currently underway against @TheEscapistMag. The attackers are specifically targeting the GamerGate forum thread,” Macris tweeted this morning. After a brief interlude the attacks began again, and eventually the publication was forced to take down the forums temporarily. The attack consists of “a large number of IP addresses targeted the GamerGate thread for reload many times per second.” At this point there is no information of the perpetrator of the attack though The Escapist is working to find out. The timing of the attack, following the revelations in the GameJournoPros emails, does raise questions. We will continue to follow this story and update as more information comes to light. If anyone has information about the attacks please don’t hesitate to reach out. Source: http://www.forbes.com/sites/erikkain/2014/09/20/the-escapist-forums-brought-down-in-ddos-attack/

Continued here:
The Escapist #GamerGate Forums Brought Down In DDoS Attack

Japanese Teen Sent to Prosecutors over DDoS Attack

Japanese police sent papers on a 16-year-old boy to public prosecutors Thursday over a suspected distributed denial of service (DDoS) attack on an online game company. It was the first criminal accusation by police in the country against a DDoS attack, which entails saturating a particular server or computer with large amounts of data, according to Tokyo’s Metropolitan Police Department. The high school student in the southwestern city of Kumamoto has admitted the charges, sources familiar with police investigations said. He told investigators that he was frustrated after the game company froze his game account and that he had a lot of fun to make numerous attacks, according to the sources. He is suspected of carrying out similar attacks on two other companies as well, the sources said. Source: http://jen.jiji.com/jc/i?g=eco&k=2014091800573

Read the article:
Japanese Teen Sent to Prosecutors over DDoS Attack

DDoS Attack on RT News Website

The RT news website has undergone the most powerful Distributed Denial of Service (DDoS) attack in its history, the press service of the channel reported Wednesday. “Thanks to the website’s reliable technical protection, RT.com was unavailable just for a few minutes,” the statement reads. According to the channel’s press service, RT.com has been repeatedly subjected to DDoS-attacks. One of the most powerful hacker attacks occurred on February 18, 2013. The website was unavailable for about 6 hours. In 2012 the channel’s English and Spanish websites also came under attack. The attack was claimed by anti-WikiLeaks hacker group AntiLeaks. A DDoS-attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. The RT network’s first channel was launched in December 2005 and now consists of three global news channels broadcasting in English, Spanish and Arabic. RT has 22 bureaus in 19 countries and territories. RT reaches over 644 million people in more than 100 countries. Source: http://en.ria.ru/society/20140918/193035597/Hackers-Attack-RT-News-Website.html

View original post here:
DDoS Attack on RT News Website