Monthly Archives: October 2015

Alleged Ukrainian botnet herder faces 43 years after Italian job snafu

Hacker fingered for heroin stunt takes the stand A Ukrainian man extradited from Italy has gone on trial in New Jersey accused of running a botnet and dealing in stolen credit cards.…

See more here:
Alleged Ukrainian botnet herder faces 43 years after Italian job snafu

Rutgers Students Want Refunds After Fifth DDoS Attack in One Year

Over 1,000 People Have Signed Change.org Petition Following September Cyberattack Rutgers students are frustrated with the university’s lackluster cybersecurity, considering the school raised tuition in part to fund $3 million worth of network upgrades after several cyberattacks brought the school to a screeching halt last semester. But on September 28, Rutgers University experienced another distributed denial of service (DDoS) attack, the fifth such attack in less than a year.  That attack shut down the school’s wireless internet service, and many other services from 1 a.m. to 2 a.m. and again from 10 a.m. to approximately 3 p.m. The university acknowledged that it was “not well protected” during the first four attacks, but had said it had since begun pouring millions of dollars into its cybersecurity efforts, as we reported. This spending was cited as one of the main reasons Rutgers University’s Board of Governos approved a 2.3% increase in tutition for the 2015-2016 year. Rutgers engineering student Riccardo Mui started a change.org petition imploring Rutgers President Robert Barchi to refund the ineffectual tuition hike. Mui comes from a humble background, raised by an immigrant father who could not support him through college. This is his take on the DDoS attack: Since I came to college, I expected at least decent internet speeds, and while it usually holds up, we get DDoS attacks every time an exam rolls around. Now I would not say anything, yet I feel the need to tell all the students to join together to either get a refund or to make Rutgers change something on their own time. Why? Because Rutger’s spent over 3 million on upgrading the network, yet only 160,000 actually went to physical upgrades. Also, they used Incapsula as a DSoS attack defender, which is decent for websites, but definitely not for a University. Besides, we literally wasted all of our money because as soon as an attack was launched, it took down the network. Since there was a tuition increase, it is only fair that we get that money back. The petition reached 300 signatures within an hour, and 750 signatures within the first fifteen hours, and now has more than 1,000 signatures. The “Reasons for Signing” section is telling.  Some students were simply angry that the university did not provide what they felt they deserved. Others suspected that the school did not even invest the money in cybersecurity at all. David Park commented, “Only a small percentage of the 3 million raised was actually used to improve Rutgers’ cyber defense system. If Rutgers doesn’t actually use all the money it’s raised from increasing the tuition for its actual purpose, refund the students.” Several students brought up Rutgers’ habit of spending big on athletics. For example, Chetan Kini wrote, “You can’t increase my tuition and then have something like this occur; it’s unacceptable. I’m pretty sure you gave my money to the damn football team since that’s where all our funding goes.” As Leslie Brighton said, “If Don Smith [Rutgers’s Vice President of Information Technology] was doing his job, I wouldn’t even know who he was.” Source: http://newbrunswicktoday.com/article/rutgers-students-want-refunds-after-fifth-ddos-attack-one-year

Originally posted here:
Rutgers Students Want Refunds After Fifth DDoS Attack in One Year

Poker Players Behind DDoS Attacks?

Have you ever wondered who exactly is responsible for the rash of Distributed Denial of Service (DDoS) attacks being aimed at online poker sites ? Such attacks have hit a number of poker rooms in recent months, including the big boys such as PokerStars and Partypoker . Even the regulated poker sites in New Jersey faced a DDoS incident over the summer, with the attackers demanding a ransom be paid in Bitcoin. Of course, the ransom was not paid, and likely never will be whenever computer miscreants attempt such schemes now or in the future. The DDoS attackers must know that taking poker sites hostage won’t result in a big payday via extortion. But could their motive be the possibility of a large payday in some other fashion? WPN a Frequent Victim Take, for instance, the case of the Winning Poker Network . WPN’s Million Dollar Sunday tournaments that guarantee a $1 million prize pool and $200,000 to the winner have repeatedly fallen victim to DDoS attacks. As I understand it, last Sunday’s event was hit once again, although WPN was apparently able to mitigate the damage and keep the tournament rolling. That was not the case last year, when WPN had to cancel such an event after several hours of play, much to the chagrin of players who were stoked and ready to take a shot at that huge prize money. It seems that someone out there has a real vendetta against WPN , targeting those $1 million guaranteed tourneys in particular. Sheldon Adelson Cleared Who could hate online poker so much to want to snuff out the only million-dollar guaranteed tournaments available to U.S. players? Ah, Sheldon Adelson certainly comes to mind. He of the Coalition to Stop Internet Gambling who has vowed to spend whatever it takes to do so. But we can likely rule out the billionaire octogenarian. His knowledge of computers and how they work is obviously lacking. Anyone who believes that youngsters can lose their parents’ house with the click of a mouse certainly wouldn’t understand the finer points of a DDoS attack and how it might be carried out. Poker Players to Blame?  Which leads us to what might be the real motive behind the DDoS attacks at WPN. Many believe that the culprits are computer hackers bent on creating havoc and destruction. But could it be that poker players hoping to scare other players away from the Million Dollar Sundays are taking aim at the network? After all, the last two events featured overlays of over $200,000 . Those are nice-sized overlays, which may be the result of players avoiding Million Dollar Sundays due to the cancellation of a $1 million guaranteed event last year and the repeated DDoS attacks that WPN has been subjected to on Sundays this year. Would poker players do such a thing? Nah, they are all upstanding citizens who don’t need to resort to such tactics for monetary gain Source: http://www.pokerupdate.com/news/industry-and-market-analysis/poker-players-behind-ddos-attacks/

View the original here:
Poker Players Behind DDoS Attacks?

DDoS defences spiked by CloudPiercer tool – paper

70% of sites trying to hide true IP address cough their secrets The real IP addresses of some 70 per cent of websites protected by popular distributed denial of service attack protection providers like CloudFlare, Prolexic and Incapsula can be revealed using a simple web tool built on newly uncovered flaws, according to a recent paper.…

Read More:
DDoS defences spiked by CloudPiercer tool – paper

Five detained in KPN, Ziggo DDoS cyberattack

Four underage boys and one man were arrested for cyberattacks on the internet service providers Ziggo and KPN. The five were interrogated by the police department’s High Tech Crime Team (THTC) throughout Tuesday following the arrest for Distributed Denial-of-Service (DDoS) attacks on both companies. All suspects were released Tuesday night after questioning. Two attacks on Ziggo in August left internet and email users without services for days, affecting a recorded 1.8 million of the company’s customers, including hospitals and medical facilities. Ziggo previously said they would not be refunding customers for their time without service. The quintet is also accused of posting videos that threatened DDoS attacks against both KPN and Ziggo, although they tried to remain unidentifiable in the video threat. Journalists at the NL Times viewed the videos at the time of the attacks on YouTube. At the time of the cyberattacks, videos surfaced online claiming responsibility, and an allegiance to hacktivist collective Anonymous. Police reported that their impression was that “The boys wanted to show that they were capable of great things.” The three youths aged between 14 and 17 years and the 21-year-old man hail from the Gelderland towns of Berkelland and Lochem, the Noord-Holland municipalities Den Helder and Schoorl, and Vinkeveen in Utrecht. Their computers, mobile phones, external hard drives and USB memory sticks were all seized from their families’ homes. The prosecutor assigned to the case decided they will wait to proceed further until investigators conclude their analysis. Police and the Public Prosecutor have urged that this is not a game and carries a criminal prosecution with up to 10 years imprisonment and the possibility of financial compensation for the damage done. Source: http://www.nltimes.nl/2015/10/07/five-detained-in-kpn-ziggo-ddos-cyberattack/

View article:
Five detained in KPN, Ziggo DDoS cyberattack

Gamers DDoS Thai government sites to protest “Great Firewall of Thailand”

Gamers and privacy campaigners in Thailand have claimed responsibility for the recent take down of several government websites in a coordinated DDoS attack last week. The attacks were in protest at government plans to route the entire country’s Internet through a single gateway, creating what has become known as “The Great Firewall of Thailand” in a nod to China’s strict control over Internet services. According to Al Jazeera, the Anti-CAT Tower Mob—which includes e-sports gamers amongst its ranks—along with the Citizens Against Single Gateway Facebook groups called upon their hundreds of thousands of Facebook fans to execute a simple DDoS attack. The fans were instructed to visit official government websites while constantly refreshing the page, causing them to crash. Over half a dozen government sites, including the Ministry of Defence, and the main government website, were taken down. In response, Thai Police announced that those targeting government sites could be charged under Article 10 of the Computer Crimes Act of 2007, and face up to five years in prison. While the controversial act has resulted in some amusing law enforcement moments in the past—including Thai military leaders warning against “underboob selfies,” it has also been used to ban Bitcoin, Uber, and dictator-simulation game Tropico 5. An estimated 110,000 websites were blocked as of 2010. With e-sports rapidly growing in popularity across Thailand, gamers have been one of the bigger online groups to oppose the single gateway. They have even personified the gateway plans themselves in the form of an anime-style villain called Nong Kalaland, who’s said to hold “the power to control the internet in her fist.” Her namesake headpiece, a coconut shell (kala), is meant to represent Thailand’s self-obsession and wilful ignorance of the larger world, according to Thai site Khaosod. The Thai government has since backed down from its single gateway plans, with the Minister of Information and Communication Technology, Uttama Savanayana, saying that the plans were simply intended to increase Thailand’s competitive edge in the online economic sector. He added that the single-gateway concept was the prime minister’s idea, and would ensure that young people who used the Internet were shielded from abuse. He also promised that the government would not infringe on the public’s right to privacy and freedom of expression. Source: http://arstechnica.co.uk/tech-policy/2015/10/gamers-ddos-thai-government-sites-to-protest-great-firewall-of-thailand/

Follow this link:
Gamers DDoS Thai government sites to protest “Great Firewall of Thailand”

Remote code exec hijack hole found in Huawei 4G USB modems

Ruskies sling malicious packet to trigger denial of service. Positive Technologies researchers Timur Yunusov and Kirill Nesterov have found since-patched remote execution and denial of service vulnerabilities in a popular Huawei 4G USB modem that can allow attackers to hijack connected computers.…

View original post here:
Remote code exec hijack hole found in Huawei 4G USB modems

Attackers prefer lower-bandwidth DDoS attacks

Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbi…

Excerpt from:
Attackers prefer lower-bandwidth DDoS attacks

Businesses Beware – DDoS Attacks Are On The Rise Again Read

British businesses are being warned to bump up their protection against Direct Denial of Service (DDoS) attacks after a new study found that the number of such assaults rose hugely in the last quarter. Research by Corero Network Security found that its customers had endured a 32 percent increase in DDoS attacks compared to the previous quarter – an average of 4.5 per day. That’s according to its Trends and Analysis Report for the first half of 2015, which also found that most of the recorded DDoS attacks were smash and grab assaults that lasted less than 30 minutes. Targeted The report found that the DDoS attacks targeting its customers in the first three months of 2015 remained relatively consistent from the previous quarter – averaging three attacks per day. The daily attack volume increased in the second quarter to an average of 4.5 attacks. Corero says that the increasing use of such attacks is down to the ease in purchasing and launching DDoS attack tools, many of which can be obtained for free, and the ability to easily include these into part of a larger strategy. “Attackers are continuing to leverage DDoS attacks as part of their cyber threat arsenal to either disrupt business operations or access sensitive corporate information, and they’re doing it in increasingly creative ways that circumvent traditional security solutions or nullify the previous effectiveness of scrubbing centres,” said Dave Larson, CTO and vice president, product, Corero Network Security. “In order to effectively protect their networks, prevent disruptions to customer operations, and better protect against data theft and financial loss, companies need real-time visibility and mitigation of all DDoS attack traffic targeting their networks, regardless of size or duration.” Under attack The past few months have seen several high profile DDoS attacks as cybercriminals look to take advantage of slightly less well-developed defences in this area. NatWest’s online banking system was the victim of an attack back in August, as was parenting website Mumsnet, showing the range of potential targets. However companies are beginning to fight back against the DDoS threat, with BT announcing today the release of its own cloud-based Distributed Denial of Service (DDoS) mitigation platform, claiming that the service will help its customers stay secure amidst growing numbers of cyber-attacks. Source: http://www.techweekeurope.co.uk/security/cyberwar/corero-ddos-attacks-rise-178274#jzBwTomdGAO2LL7m.99

Read the original post:
Businesses Beware – DDoS Attacks Are On The Rise Again Read

Early warning helped five Russian banks ward off DDoS attacks

Five Russian banks that experienced a distributed denial of service (DDoS) attack Sept. 26 believed to have been aimed at starting a bitcoin-related panic had been warned in advance by the General Directorate of Security and Information Protection of the country’s Central Bank. The regulatory body’s deputy director, Artyom Sychev, was quoted by The CoinTelegraph as saying the attackers were likely trying to cause panic and destabilization rather than collect a bitcoin ransom. The early warning helped the banks fend off the attack, although they did receive threatening letters in the aftermath. The CoinTelegraph also quoted a Central Bank official saying that the letters said, “To prevent such acts in the future, the attackers are asking to send only 50 BTC to their Bitcoin wallet.” Source: http://www.scmagazine.com/ddos-attacks-on-russian-banks-reportedly-aimed-at-causing-bitcoin-panic/article/442842/

View article:
Early warning helped five Russian banks ward off DDoS attacks