Tag Archives: defend against ddos

‘Bitcoin Baron’ claims credit for City of Columbia, KOMU DDoS attacks

He cited a 2010 SWAT raid in Columbia as his motivation behind the DDoS attacks. An individual is taking credit for the distributed denial of service attacks on the websites of the City of Columbia and KOMU-8 on Friday. KOMU posted about the attack on its Facebook page at 3:48 p.m. Friday, about three hours after the station had reported on a similar attack on the City of Columbia’s website earlier Friday. KOMU’s article included a statement from Assistant City Manager Tony St. Romaine indicating the activist group Anonymous was behind the attacks. Shortly after their site was attacked, KOMU received an email from a third party who indicated that he, not Anonymous, was behind both attacks. KOMU General Manager Marty Siddall said the individual referred to himself as “Bitcoin Baron.” Through his Twitter, Bitcoin Baron has connected himself to multiple other DDoS attacks. Bitcoin Baron said in a video that his motivation behind the attacks was a 2010 Columbia SWAT raid on the house of Jonathan Whitworth, who was presumed to be a marijuana dealer. During the raid, one of Whitworth’s dogs was fatally shot in front of his wife and child. “I decided that this should go viral once more to show everyone the true nature of how you and every police department does things,” Bitcoin Baron said in his video. Bitcoin Baron said in a tweet that no data was affected by any of the DDoS attacks. Prasad Calyam, assistant professor of computer science with a technical focus in cyber security, said DDoS attacks occur when a user creates a large amount of fake traffic that accesses a site’s servers all at once to crash the site. “(A DDoS attack) is a sort of brute force attack, where many machines are compromised to act like regular users in order to block real users from reaching the site,” he said. Calyam said DDoS attacks cannot be stopped as they occur, and he advised that locally blocking a website is the best way to deal with an attack. “(That is) because it’s hard for an Internet provider to block people from accessing your site,” he said. “The only way to prevent attacks is through an intrusion detection system, which can be really expensive … There are open source intrusion detection systems available, but they must be maintained and managed by experts.” Siddall said KOMU is working with their third-party Internet provider to prevent future attacks. Source: http://www.themaneater.com/stories/2014/12/29/bitcoin-baron-claims-credit-city-columbia-komu-ddo/

More here:
‘Bitcoin Baron’ claims credit for City of Columbia, KOMU DDoS attacks

Sony issues formal response to DDoS attacks in PSN update

For the first time in days, Sony has issued a formal response to the ongoing distributed denial-of-service (DDoS) affecting various networks in the gaming industry, including PlayStation Network. While the update doesn’t offer much in terms of when PlayStation owners can expect full service to resume, Sony has at least assured us that they are working to restore full network access. Note: An update on Sony’s official support page notes that service is restored on PS3 and Vita; however, PSN is still down on PS4. A special section of the website is dedicated to PSN post-restoration that says if you are continuing to experience problems after PSN services are fully restored to refer to Contact Support. Here’s the full message from Catherine Jensen, VP of SCEA Consumer Experience. The video game industry has been experiencing high levels of traffic designed to disrupt connectivity and online gameplay. Multiple networks, including PSN, have been affected over the last 48 hours. PSN engineers are working hard to restore full network access and online gameplay as quickly as possible. From time to time there may be disruptions in service due to surges in traffic, but our engineers will be working to restore service as quickly as possible. If you received a PlayStation console over the holidays and have been unable to log onto the network, know that this problem is temporary and is not caused by your game console. We’ll continue to keep you posted on Twitter at @AskPlayStation and we’ll update this post once the problems subside. Thanks again for your patience. The DDoS attacks on PSN (and Xbox LIVE) began around Christmas Day. Though neither Sony nor Microsoft admitted to being DDoS’d, the notorious hacker group Lizard Squad was eager to claim credit. For those unfamiliar, this is the same group that launched multiple attacks earlier this year, including bomb threats to SOE president John Smedley. On Friday, one of the numerous Twitter accounts claiming to be Lizard Squad said the DDoS attacks were stopped and that any ongoing disruptions were “just the aftermath” of hours worth of traffic bombardment. However, another account claiming to be one of the prominent members of Lizard Squad, continued to tweet out messages suggesting the DDoS attacks were continuing. Even now, two days after Christmas, PSN is still struggling to return to full service; although, some believe it to be Sony simply restructuring its system architecture. At this point it’s still not 100 percent certain if the outages are ongoing DDoS attacks, but it appears for now at least that Sony has a grasp on the problem and is working to restore service. Hopefully they are addressing the issues and even working to prevent this sort of thing from happening in the future. Considering this isn’t the first time PSN has been brought down for a lenghty period, I’m hoping Sony will finally take some serious action in preventing this sort of outage again. But, I’m also skeptical; if they haven’t learned by now, when will they? Source: http://www.gamezone.com/news/sony-issues-formal-response-to-ddos-attacks-in-psn-update-9048-jrni

View original post here:
Sony issues formal response to DDoS attacks in PSN update

Update: Columbia’s website back online after cyber attack; KOMU down from DDoS attack

UPDATE: This story has been updated to include details of another denial of service attack on KOMU and additional comments on FBI involvement in investigating the attack on Columbia’s website. COLUMBIA — The city’s official website is back online after being down since Wednesday night, when a cyber attack flooded the server with information requests. But the hacker responsible might have found a new target in KOMU. The city’s site, gocolumbiamo.com, was back up as of 12:35 p.m. The site provides information and updates to the public about city services and events. Deputy city manager Tony St. Romaine said city officials have been in touch with the FBI about the incident. Joel Sealer, a spokesman for the FBI in Kansas City, said only that city officials had been in contact with the agency, but he would not comment on or confirm the existence of an investigation. St. Romaine said the activist hacker group Anonymous was the source of the attack on the city’s site, but a YouTube video posted by Bitcoin Baron denies that affiliation and claims sole responsibility for the attack. In the video’s introduction, Bitcoin Baron states that the attack is in retaliation for a February 2010 incident where Columbia police killed one dog and wounded another during a drug raid. The YouTube video then shows footage from the raid. The city’s website was hit by a distributed denial of services attack, which sent requests from multiple sources to the site’s server to overload its bandwidth capacity. City staff became aware of the problem at around 11 p.m. Wednesday and shut down access to the site to sort out the problem. KOMU.com’s outage began around 3 p.m. Friday, and KOMU posted on its Facebook page at 4 p.m. Saturday to address the distributed denial of service attack. In the post, KOMU calls the attack a “direct result” of its reporting on the city’s website being taken down. Its story noted that city officials believed Anonymous was responsible, but a third party contacted the news station to claim responsibility and threaten to take down KOMU.com as well. Attacks of this nature generally don’t result in the theft of information or other security loss, St. Romaine said. “Your system is not getting hacked into, and data is not getting compromised,” he said. Source: http://www.columbiamissourian.com/a/183192/update-columbias-website-back-online-after-cyber-attack-komu-down/

Continue Reading:
Update: Columbia’s website back online after cyber attack; KOMU down from DDoS attack

DDoS attack takes down City of Columbia website

Columbia Deputy City Manager says a hacker group took responsibility for the attack on GoColumbiaMo.com A City of Columbia official said the city’s website, gocolumbiamo.com, suffered a cyber attack Wednesday night, and the website will be down until further notice. Deputy City Manager Tony St. Romaine said Anonymous, a group associated with cyber attacks and hacking activism, took down the city’s website with a Distributed Denial of Service (DDoS) attack. St. Romaine said the group cited a drug-related SWAT raid in Columbia in 2010, where police shot two dogs in the house. A YouTube video shows a user taking credit for the attack, along with the SWAT raid from 2010. (Warning: the video contains strong language and graphic content.) A news release sent Friday morning said the city’s IT department was notified of an attack around 11 p.m. Wednesday. Deputy City Manager Tony St. Romaine told ABC 17 News IT staff worked through the night until 7 a.m. Thursday. The staff left the office, but continued to work from home. “This form of attack is an attempt to make an online service unavailable by flooding the website server with requests from multiple sources,” the release said. “In most cases, they involve forging of sender addresses so that the location of the attacking machines cannot easily be identified.” The release said this sort of attack renders city services provided online unavailable, and doesn’t compromise personal information. Source: http://www.abc17news.com/news/city-of-columbia-website-suffers-cyber-attack/30405572

View article:
DDoS attack takes down City of Columbia website

Xbox Live and PSN Face DDoS Attacks Throughout Christmas Eve and Day

During a day when people are booting up their new Xbox Ones and PlayStation 4s for the first time, a group of Grinches have decided to try and ruin things for everyone online. During what is supposed to be one of the most joyful days of the year for families across the world, the hacker group Lizard Squad claims responsibility for hitting Microsoft’s Xbox Live and Sony’s PlayStation Network with DDoS attacks, Tech Worm reports. The Lizard Squad’s main Twitter account has been banned, but other representatives of the group (warning: NSFW language) are saying they are the reason why both Xbox Live and the PSN have been experiencing outages throughout the past 24 hours. In response, a pro gaming hacker crew called The Finest Squad has been exposing various members of the Lizard Squad to the proper authorities. Unfortunately, the deviant hacker group appears to always be a step ahead of The Finest Squad. Xbox’s servers are currently up, but they have been experiencing outages every few hours on the official server status page (which currently lists accessibility as “Limited”). The same could be said of Sony, as the official PlayStation Help Twitter made a comment about the PSN’s recent issues: Here’s to hoping these hackers get caught and the attacks stop. Go hack the Westboro or KKK websites instead of doing this sort of thing, Lizard Squad. Just leave the gaming community alone so we can play our new games in peace without bothering anyone. Source: http://arcadesushi.com/xbox-live-and-psn-face-ddos-attacks-throughout-christmas-eve-and-day/

Read more here:
Xbox Live and PSN Face DDoS Attacks Throughout Christmas Eve and Day

DDoS attacks carry six-figure price tag for businesses

The average distributed denial-of-service (DDoS) attack costs large businesses an average of $444,000 in lost revenue and subsequent IT spending, according to a recent survey by B2B International. The same poll found that DDoS attacks hit the bottom line of small-to-medium-sized businesses (SMBs) at an average clip of $52,000 per incident. Kaspersky Lab sponsored the annual survey, conducted by B2B International, which polled 3,900 respondents from 27 countries about IT infrastructure challenges they faced from April 2013 through May 2014. All businesses at risk Businesses of all sizes were polled, with approximately 17 % coming from large enterprises (5,000 to 50,000 employees), 12% from the large/medium category (1,500 to 5,000), 25% from the medium/small (250 to 1,500) enterprise segment, and the remaining from small businesses. Overall, nearly 1 in 5 businesses (18%) experienced a DDoS attack during the year-long study period. The polling then drilled down into business verticals that provide online financial services or operate public-facing websites. Among this subset that relies on 24/7 web access for clients, the survey found that 38% experienced at least one DDoS attack during the study period. When this subset was broken down into specific business verticals, the poll found that 49% of IT/technology firms suffered at least one DDoS incident during the study period, followed by e-commerce sites (44%), telecommunications (44%), media (42%), construction/engineering (40%) and finance (39%). Downtime = Money The most frequent effects of DDoS attacks include slow-loading web pages, inability to complete online transactions, or complete service disruption – all of which weigh heavily on a business that relies on the web for revenue. Survey respondents listed potential losses in revenue (33%) and damage to company brand (38%) as the two most negative outcomes from a DDoS attack. This is in lockstep with their management’s concerns, who list loss of revenue (26%) and customer trust (23%) as the most feared outcomes of such an attack. A disconnect between the potential threat of DDoS and investments to detect or mitigate these attacks is apparent when dissecting the survey. For example, media companies were fourth on the list of most targeted, by only 38% of respondents from these firms listed DDoS countermeasures as a security priority. Among e-commerce respondents, whose businesses may be most heavily affected by the effects of a DDoS attack, only 41% noted DDoS security investment as a priority. “Even if a company does not have a public-facing website, its finances and reputation can be seriously affected by DDoS attacks”, said Eugene Vigovsky, head of DDoS protection at Kaspersky Lab, in a statement. “It is known that DDoS can be organized not only to incapacitate online services or for ransom, but also to mask other cybercriminal activities, such as targeted attacks…to gain access to confidential data.” Watching your availability When it comes to online security, most organizations tend to focus on the confidentiality or integrity of data and services, often at the expense of availability, noted Lenin Aboagye, Director of IT, cloud and product security for data center provider IO. He told DatacenterDynamics that companies experiencing DDoS-related downtime stand to lose money every minute their web services are affected. “If you operate a downed e-commerce site, and people cannot make a purchase especially during this holiday season, then losses can be substantial”, he added. “Most organizations do not look into this area of security because it’s not considered a data breach event that requires customer notification.” Source: http://www.datacenterdynamics.com/focus/archive/2014/12/ddos-attacks-carry-six-figure-price-tag-businesses

More:
DDoS attacks carry six-figure price tag for businesses

Alibaba : Cloud Suffered DDoS Attack for 14 Hours

A well-known game company on Alibaba Cloud Computing suffered a DDoS attack for 14 hours from December 20 to 21. However, Alibaba has not disclosed the name of the game company and why the company was attacked. Alibaba condemned the hacking attack and called on all Internet innovation companies to jointly resist hacking. Alibaba Cloud said in the microblogging “faced with hacker attacks, we cloud never compromise.” Source: http://www.4-traders.com/ALIBABA-GROUP-HOLDING-LTD-17916677/news/Alibaba–Cloud-Suffered-DDoS-Attack-for-14-Hours-19594653/

Continue reading here:
Alibaba : Cloud Suffered DDoS Attack for 14 Hours

Garden-variety DDoS attack knocks North Korea off the Internet

Experts cite the fragility of North Korea’s connection, note that routine DDoS attacks could have easily forced the country offline The simplest explanation for North Korea’s suddenly dropping off the Internet was a distributed denial-of-service (DDoS) attack that overwhelmed the isolated nation’s tenuous connection to the rest of the world, experts said Monday. North Korea’s Internet connection went down around 11 a.m. ET Monday, and was restored about nine and a half hours later, at approximately 8:45 p.m. ET. But within hours, some sites checked by Computerworld , including North Korea’s official news agency, were again offline. A DDoS attack could have been launched by a small group or even an individual, the researchers said. “If it turns out it was an attack, I’d be far more surprised if it was a government launching the attack than I would if it was a kid in a Guy Fawkes mask,” said Matthew Prince, co-founder and CEO of security firm CloudFlare, in an email. Prince and others bet that a run-of-the-mill DDoS attack took down North Korea’s Internet because the isolated country has a “pipe” to the Internet so narrow that a routine attack could easily flood its capacity and take it offline. Ofer Gayer, security researcher at Incapsula, estimated North Korea’s total bandwidth at 2.5 Gbps, far under the capacity of many recent DDoS attacks, which typically are in the 10Gbps to 20Gbps range. “Even if North Korea had ten times their publicly reported bandwidth, bringing down their connection to the Internet would not be difficult from a resource or technical standpoint,” Gayer said, also in an email. Almost all of North Korea’s Internet traffic passes through a connection provided by China Unicom, the neighboring country’s state-owned telecommunications company. North Korea has just a single block of IP (Internet protocol) addresses, or just 1,024 addresses, another vulnerability; in comparison, the U.S. boasts 1.6 billion IP addresses. “When organizations –- nation states or commercial entities -– rely on a single Internet service provider and a small range of IP addresses, they make themselves easy prey,” Gayer said. “Attackers have a single target -– the one connection to the Internet backbone –- to flood with traffic.” According to Prince of CloudFlare and Jim Cowie, chief scientist at Dyn Research, North Korea — officially named the Democratic People’s Republic of Korea (DPRK) — went completely dark after a weekend of intermittent connectivity. For example, Computerworld was unable to reach the DPRK’s Central News Agency, its official mouthpiece, much of Sunday, Dec. 21. The IDG News Service, which like Computerworld is owned and operated by IDG, reported Monday that North Korea had fallen off the Internet. North Korea’s outage might have gone unreported but for the November hack of Sony Pictures; the release of gigabytes of the Hollywood studio’s internal documents; Sony yanking The Interview , a comedy that portrayed the assassination of Kim Jung-un, the country’s dictator, after hackers threatened American theaters; and the U.S. government’s contention that North Korea was responsible. In comments last week, President Obama said, “We will respond proportionally [to North Korea], and we will respond in a place and time and manner we choose.” But it’s far more likely that North Korea’s connection to the world was severed by hacktivists or cyber terrorists than by the U.S., or any other nation, the researchers said. Dan Holden, the director of Arbor Networks’ security engineering and response team, said the attacks were relatively small in scale — the weekend peak was just shy of 6 Gbps — and among other targets, took aim at the primary and secondary DNS (domain name system) servers for most websites in North Korea. “It’s not as if a super sophisticated attack is needed in order to cripple it,” Holden said in a Monday blog. Holden also pointed out that a pair of hacktivist cyber-terrorist groups, Anonymous and Lizard Squad, had taken to Twitter to threaten to attack North Korea. Both groups have used DDoS attacks in the past to knock sites offline. Prince of CloudFlare posed other possibilities, ranging from North Korea purposefully cutting itself off from the Internet — a move other authoritarian regimes have made, such as Syria — to China Unicom breaking the connection. But Prince leaned toward the DDoS theory. “Given the largest DDoS attacks are an order of magnitude larger than [North Korea’s capability], it is conceivable that an attack saturated the connection and knocked the site offline,” Prince said. “It’s worth remembering that just a few weeks ago a teenager in the U.K. pleaded guilty for single-handedly generating a 300Gbps attack against Spamhaus.” Prince’s reference was to the 17-year-old arrested this summer and charged with launching a massive DDoS attack in March 2013 against the anti-spam organization. Cowie of Dyn Research concurred with the other experts who pointed to the flimsiness of North Korea’s Internet connection, although like Prince, he said there might have been causes other than a DDoS. “A long pattern of up-and-down connectivity, followed by a total outage, seems consistent with a fragile network under external attack,” Cowie said in a Monday blog. “But it’s also consistent with more common causes, such as power problems.” North Korea did not mention the outage on its news website late Monday before it again went dark, but it did include a rambling 1,700-word missive from the National Defense Commission (NDC), the agency that controls the country’s huge military forces. The NDC sharply threatened the U.S. with retaliation if a cyberattack was launched against the DPRK. “The army and people of the DPRK are fully ready to stand in confrontation with the U.S. in all war spaces including cyber warfare space to blow up those citadels,” the NDC said in a bellicose statement. “Our toughest counteraction will be boldly taken against the White House, the Pentagon and the whole U.S. mainland, the cesspool of terrorism, by far surpassing the ‘symmetric counteraction’ declared by Obama.” Source: http://www.computerworld.com/article/2862652/garden-variety-ddos-attack-knocks-north-korea-off-the-internet.html

Continued here:
Garden-variety DDoS attack knocks North Korea off the Internet

50% of companies unprepared for DDoS attacks

Research carried out by Kaspersky Lab and B2B International has revealed that only 50% of companies regard countermeasures against distributed denial of service (DDoS) attacks as an important component of IT security. It means that the other 50% of companies may prove to be unprepared for a sudden attack, which could damage both their finances and their reputation as a result of the unavailability of internet services. Different industries have different views on how important it is to protect against DDoS attacks. For example, 60% of financial institutions, energy companies and utility services are conscious of the need of protection against DDoS attacks. This is the highest percentage of any industry. But it seems quite low considering that IT continuity is critical for these structures as they affect the well-being of many people. There is also a noticeable difference of opinion among different sized organizations: only 38% of small businesses consider protection against DDoS attacks an important component of IT security,but for big companies this figure reaches 60%. In recent years, DDoS attacks have become a common tool for cybercriminals and their clients. There are many different reasons for organizing these attacks — hooliganism, dishonest competition, blackmail. Currently the price to order a large-scale attack starts from just $50. Each year brings increasing numbers of DDoS attack schemes, so IT professionals at any company need to consider ways of protecting against them. According to the research, 23% of companies include maintaining the continuity of business processes in the top 3 most important tasks of their IT services. Interestingly the survey found no clear correlation between the level of threat faced in reality and the recognition of the need for DDoS protection. For instance, the sectors with public facing online services most affected by these incidents included IT companies (49%), e-commerce (44%), telecom (44%) and the media (42%). At the same time, countermeasures against DDoS were named as important by 53% of telecoms companies, 50% of IT businesses and only 41% of e-commerce and 38% of media companies. Source: http://timesofindia.indiatimes.com/tech/tech-news/50-of-companies-unprepared-for-DDoS-attacks-Report/articleshow/45575197.cms

View article:
50% of companies unprepared for DDoS attacks

US Officials Believe North Korea Was Involved In Sony Hacks

U.S. officials say they believe that North Korea’s government was involved in the large-scale hack of Sony servers, which led to the leak of troves of Sony data from emails to unreleased projects, according to the NYT. Federal cyber-security sources say that there is evidence indicating that the hack was routed through computers in Singapore, Thailand, Italy, Bolivia and Cyprus, ABC reports. While the hack resulted in a dump of Sony data, including email, confidential materials, and unreleased projects, it also specifically targeted The Interview , a movie featuring Seth Rogen and James Franco. The theory that North Korea was behind the attack was initially dismissed when North Korea publicly denied involvement, but official sources believe that the North Korean government was “centrally involved” in the attacks. The New York Times reports that officials aren’t going on the record, and are unsure whether or not the White House will publicly accuse Kim Jong Un and North Korea of the attack. The hackers’ methodology is highly reminiscent of tactics used by Anonymous — timed dumps of sensitive data, DDOS attacks, etc. — which have thus far clouded the investigation. The Interview , which depicts the assassination attempt of Kim Jong Un, was slotted to be released on Christmas Day until Sony was forced to pull the movie. Amid 9/11-referencing threats from the hacker organization, which called itself the Guardians of Peace, five of the major theater chains said they would not show the film, leading Sony to pull back entirely. Source: http://techcrunch.com/2014/12/17/us-officials-believe-north-korea-was-involved-in-sony-hacks/

Visit link:
US Officials Believe North Korea Was Involved In Sony Hacks