Tag Archives: denial of service

WikiLeaks Back In Business After Being Hit By A Week Of Distributed Denial of Service ‘DDoS’ attack

The WikiLeaks website came back online last Tuesday after being down for almost a week due to Distributed Denial of Service Attack (DDoS). The secret-leaking organization says it has been targeted by DDoS making its website inaccessible or sluggish for several days. The attack was said to have began at the beginning of August and has intensified to affect other affiliated sites. A group calling itself “AntiLeaks” claimed responsibility for the attacks following their post on Twitter saying that they were against Julian Assange’s intention to seek political asylum in Ecuador. DDoS attacks work by sending heavy amount of traffic to the servers of a website in the hopes to overload them and to force them to shut down. Such type of attack is the most common form of cyber attacks. According to Wiki Leaks, its servers have been flooded with 10 gigabits per second of fake traffic from thousands of different machines. Experts monitoring the issue noted that the amount of traffic is larger than the usual attacks seen in the past few years. AntiLeaks claim it has no ties to the United States government or any other governments tagged as enemies of WikiLeaks. Many people thinks the DDoS attacks on WikiLeaks was a response to the whistleblower website’s posting of documents showing how TrapWire works. TrapWire is a system being utilized in the US to counter terrorism by collecting and analyzing footages from security cameras and license plate readers around the country. Details about the counterterrorism surveillance system were revealed by Anonymous following an email hacking incident on security intelligence firm Stratfor. WikiLeaks released the documents obtained by Anonymous early this year. Observers believe that it’s a secret digital surveillance effort currently being used around the world. For fast protection for DDoS for your e-commerce website click here . Source: http://thedroidguy.com/2012/08/wikileaks-back-in-business-after-being-hit-by-a-week-of-hacking-attack/

Taken from:
WikiLeaks Back In Business After Being Hit By A Week Of Distributed Denial of Service ‘DDoS’ attack

Bambuser Distributed Denial of Service ‘DDoS’ attack may be connected with Assange embassy stream

Bambuser came under a distributed denial-of-service attack on Thursday morning, possibly in connection with a user’s coverage of the Ecuadorian embassy where Wikileaks founder Julian Assange is holed up. The connection is not certain, but Bambuser’s Swedish proprietors say they had received threatening tweets just prior to the attack. Bambuser chief Jonas Vig told ZDNet that the DDoS took the service down for “almost an hour” and made it “hard to reach for another hour”. Bambuser lets people stream live video from their smartphones to the web. It has become very popular with activists and protestors, from the Occupy movement to Russia and Syria. The service has come under attack before, with the attacks generally coinciding with marches and protests that are being covered on Bambuser. The stream that appears to have solicited the DDoS is that of ‘citizen journalist’ James Albury, who has stationed himself outside the Ecuadorian embassy in London. Julian Assange has been inside the embassy since June, and the Ecuadorian government is set to announce its decision regarding his asylum bid later on Thursday. A diplomatic row erupted overnight, after Ecuador accused UK authorities of preparing to storm the embassy. Assange is wanted for questioning in Sweden over sexual coercion and rape allegations, and the UK wants to extradite him there under a European Arrest Warrant. Vig explained that the tweets Bambuser had received were not of the ‘tango down’ variety, but they did indicate that “it was someone aiming the attack directly at some specific users of ours”. “We still don’t want to speculate who was behind it, but there’s some indication it was directly aimed at blocking the streams from the embassy,” he added. “It was quite a serious attack,” Vig said. “We consider all DDoSes as serious.” A new anti-Wikileaks hacker, or group of hackers, called Antileaks has suggested on Twitter that he, she or they might be responsible for the DDoS. For fast DDoS protection against your e-commerce website click here . Source:

View the original here:
Bambuser Distributed Denial of Service ‘DDoS’ attack may be connected with Assange embassy stream

Distributed Denial of Service ‘DDoS’ crooks: Do you want us to blitz those phone lines too TDoS?

Cybercrooks are now offering to launch cyberattacks against telecom services, with prices starting at just $20 a day. Distributed denial of attacks against websites or web services have been going on for many years. Attacks that swamped telecoms services are a much more recent innovation, first starting around 2010. While DDoS attacks on websites are typically launched from botnets (networks of compromised Windows PCs under the control of hackers), attacks on telecom lines are launched using attack scripts on compromised Asterisk (software PBX) server. Default credentials are one of the main security weaknesses used by hackers to initially gain access to a VoIP/PBX systems prior to launching voice mail phishing scams or running SIP-based flooding attacks, say researchers. Telecoms-focused denial of service attacks are motivated by the same sorts of motives as a DDoS on a website. “Typical motives can be anything from revenge, extortion, political/ideological, and distraction from a larger set of financial crimes,” a blog post by Curt Wilson of DDoS mitigation experts Arbor Networks explains. Many of the cybercrime techniques first seen while crooks blitzed websites with junk traffic are being reapplied in the arena of flooding phone lines as a prelude to secondary crimes, according to Arbor. “Just as we’ve seen the Dirt Jumper bot used to create distractions – by launching DDoS attacks upon financial institutions and financial infrastructure at the same time that fraud is taking place (with the Zeus Trojan, or other banking malware or other attack technique) – DDoS aimed at telecommunications is being used to create distractions that allow other crimes to go unnoticed for a longer period.” Arbor details an array of services offered by hackers, some of which offer to flood telephones (both mobile and fixed line) for $20 per day. The more cost-conscious would-be crooks can shop around for a service that offers to blitz lines for $5 an hour, the price offered in another ad spotted by the ASERT security research team. As well as blitzing phone lines, other attacks against a targeted organisation’s VoIP system or SIP controllers are possible. Poorly configured VoIP systems can be brought down even by something as simple as a port scan, Wilson notes. “In such cases, an attacker could bring down an organisations’ phone system quickly if they were able to reach the controller. The benefits of proactive security testing can help identify such brittle systems ahead of time, before an attacker might latch onto the vulnerability. “Any system is subject to availability attacks at any point where an application layer or other processor-intensive operation exists as well as the networks that supply these systems via link saturation and state-table exhaustion. Telecommunications systems are no exception to this principle, as we have seen. Clearly, there is money to be made in the underground economy or these services would not be advertised,” Wilson concludes. For fast protection against your e-commerce website click here . Source: http://www.theregister.co.uk/2012/08/02/telecoms_ddos/

Visit link:
Distributed Denial of Service ‘DDoS’ crooks: Do you want us to blitz those phone lines too TDoS?

Indicted College Student Speaks Up About Her Case for involvement of distributed denial-of-service (DDoS) attacks

A college student arrested last year for alleged involvement in distributed denial-of-service (DDoS) attacks waged by Anonymous appeared publicly here Saturday on a panel discussing the hacktivist collective and online civil liberties. Mercedes Haefer, an undergraduate student at the University of Nevada Las Vegas who was indicted in July 2011 with 13 others for alleged conspiracy to commit DDoS attacks against PayPal’s website, spoke out briefly about her case in the panel session entitled “Anonymous and the Online Fight for Justice.” “I am charged with conspiracy to DDoS,” Haefer said during the panel discussion, noting that she found the charges “amusing.” She would not comment on the specific circumstances that led to her arrest. Anonymous talk at Def Con focused more on online civil liberties and activism, and came amid the backdrop of a screening of “We Are Legion” documentary held at the famed hacker conference. It was a far cry from last year’s Def Con, where some members donned their signature Guy Fawkes masks, while others shouted down speakers during a question-and-answer session on a panel about building a “better” Anonymous. Legal experts on Saturday’s panel pointed to a disparity in sentencing for physical activism versus hacktivism. Marcia Hoffman, a senior staff attorney at the Electronic Frontier Foundation, says the penalty for online civil disobedience is severe. “I’m not talking spending the night in jail. Federal hacking law [prescribes] up to 10 years in prison: That’s an incredibly harsh penalty,” Hoffman says. “It’s disconcerting that young people flexing their political muscle get 10 years in prison for [a] first-time offense.” Whether DDoS should be considered a legitimate form of protest was also debated. “Under certain circumstances, DDoS is protected political speech and should be afforded First Amendment rights,” said criminal defense attorney Jay Leiderman, who is representing Christopher Doyon, an alleged member of Anonymous who goes by the handle “Commander X.” Leiderman said an interview today that Commander X’s case and the PayPal case are classic examples of how some DDoS attacks should be treated as free speech. In the former, Commander X and others camped out for months in front of the Santa Cruz, Calif., courthouse protesting a crackdown on homeless people sleeping in the streets. “In the wake of more arrests, he and a small number of people allegedly DDoS’ed the County of Santa Cruz, slowing its server for 18 minutes,” he says. “That use of DDoS is a classic form of political speech, where the government is ignoring you and [you] get their attention in a nonharmful and noninvasive way with something to let them know you are out there.” Josh Corman, who has been researching Anonymous and, along with Brian Martin writing a series on “Building A Better Anonymous,” says the DDoS-as-free-speech argument made by the panel was interesting. Corman says he sees the disparity in a $250 fine for physical civil disobedience and a 10-year prison sentence for the digital equivalent. “I can see a reasonable argument that this is a legitimate form of free speech … I can see the disparity in the law there. Maybe they have a case there, but I’ll let people smarter than me decide,” Corman says. “[But] then I realize what a massive distraction that [argument] was.” The free speech DDoS argument distracts from the more malicious activity some members of Anonymous have conducted, he says. “And all of that drowns out the potentially noble” activity, he says. The bottom line is that DDoS doesn’t really accomplish what the hacktivists want it to, anyway, he says. “It doesn’t have any lasting damage at all. It’s a tool of fear” and is noisy, but hasn’t effected the type of change in the targeted organizations that the hacktivists had intended, Corman says. Sony, for example, suffered “orders of magnitude more” in financial losses from the massive earthquake in Japan than from the more than 21 DDoS attacks waged against it, he says. Meanwhile, Haefer offered a little insight into how Anonymous operates: In response to a question about how an Anonymous plan to out Mexican government officials with ties to drug cartels didn’t materialize, she said sometimes the intentions are there, but action may not be “feasible at that time.” “A lot of times where people start up an op with the intention of trying to do something, and someone will jump the gun and say, ‘We’re going to [f’ing] do it,’ and sometimes it’s not always possible with the people we have around and their lives” and other commitments, she said. At A Crossroads Corman says a small group of Anonymous members should define what free speech online means, and a find a better way to protest than DDoS attacks, he says. “I can envision truly noble online activism as transformative as a civil rights movement,” he says. Corman and others at an earlier panel at Def Con urged the security community to be aware and speak out about privacy and freedom concerns at the upcoming World Conference on International Telecommunications (WCIT-12) meeting. Experts say the meeting could result in the potential restructuring and governance of the Internet that could ultimately hamper user access and freedoms. The security community could be doing more to carry the torch here as a more formal means for Internet activism, he says. “The original Def Con crowd could be a force of organized chaos that keeps the peace actively or passively,” Corman says. And Anonymous, meantime, is at a crossroads, according to Corman. “Several [of them] are ready to engage on what a better Anonymous might look like,” he says. For fast DDoS protection against your website click here to view DOSarrest services. http://www.darkreading.com/database-security/167901020/security/attacks-breaches/240004684/indicted-college-student-speaks-up-about-her-case-anonymous.html

View original post here:
Indicted College Student Speaks Up About Her Case for involvement of distributed denial-of-service (DDoS) attacks

Tablet’s Server Outages due to Distributed Denial of Service ‘DDoS’ attack

For the last several months, Tablet Magazine’s servers have been coming under recurring distributed denial-of-service attacks, or DDoS attacks . Yesterday we suffered two major attacks, the first around 1:30 p.m., shortly after we posted Michael C. Moynihan’s explosive article about the further dishonesty of Jonah Lehrer, the author and New Yorker writer. The Lehrer story brought us an unprecedentedly large legitimate traffic load. Some commentators and observers speculated that that’s what brought us down. It’s true that the rush of readers coming to the Lehrer story was much larger than normal, but I am assured by our IT team that we had more than sufficient bandwith and server memory to handle it. Notably, for several midafternoon hours, when we were not under attack, we served extraordinarily high traffic loads uneventfully. Our IT team strongly believes that what we were experiencing—and have been for some time—are sophisticated attacks specifically targeting Tablet, not just run-of-the-mill Internet-as-Wild-West hijinks. It is possible that whoever is out to get us seized on a moment when we had high publicity and high server demand to attack. It sounds a little paranoid, granted, but as the saying goes, just because you’re paranoid doesn’t mean they’re not out to get you. The romantic in me hopes it’s the Iranians. Meantime, we’re doing what we can to keep the site up, and we apologize for our no-doubt maddening unreliability. And if you’re a DDoS-mitigation expert who’s eager for some pro-bono work, you know where to find us. Source: http://www.tabletmag.com/scroll/107948/on-tablet%E2%80%99s-server-outages

Follow this link:
Tablet’s Server Outages due to Distributed Denial of Service ‘DDoS’ attack

Family First site back online after Distributed Denial of Service ‘DDoS’ attack

Family First’s anti gay marriage website is back up and running after an “unprecedented attack” took out the website’s host servers. “Protect Marriage” was launched by Family First yesterday, but minutes later was removed from the web when it became the immediate target of a “large-scale denial of service attack” according to the site’s webhost. Family First director Bob McCroskrie said the website was dedicated to opposing Labour MP Louisa Wall’s Marriage Equality Bill, which was pulled from the ballot last week and had sparked heated debate from both sides. While the site was reinstated a couple of times yesterday, its Christchurch-based webhost had to eventually pull the site completely because hackers had overwhelmed their servers so much it affected every other website hosted by the company. Family First’s own website was also hosted by the company and has also been pulled. A message is now reading the domain for familyfirst.org.nz has been suspended. Family First has reinstated the site with an international hosting company that had larger servers and tighter security measures. “It is disappointing that some opponents in the marriage debate are unwilling to have robust debate and are resorting to desperate – but failed – attempts to shut us down,” McCroskrie said. “We are also disappointed that our web host company was targeted with offensive emails simply because they were a Christchurch business that we wanted to support and who were willing to host some of our websites.” Meanwhile, US band Train have tweeted they are working on getting their music video “Marry Me” removed from the site, but it still featured on the site’s homepage today. Train caught wind their song was being used by Family First after a Twitter user alerted the band their song was being used on an “anti gay marriage website”. A user named @Mikey_J_S6 tweeted the band last night saying: “Why does your music video appear on a homophobic lobby group’s website?”. Train responded saying “Didn’t know. Getting it off asap. Tnx 4 tip”. McCroskrie said they had not yet heard from Train, but if they were asked to take the song down they would. “We’re not going to go by some post on Twitter, but if the band contact us then we will certainly take it down.” Latest tweets would suggest it is now in the hands of Sony, who were working to get the video off the website. At a Victoria University debate on the issue at the weekend, Wall said she expected a significant amount of vitriol directed her way and had already received nasty emails from those who opposed it. “But you know what, I just send them back some love because that is what this is all about.” Wall, who is the bill’s leader, said the point of it was to put human rights at the forefront of discussion. “It’s not about friction or conflict, it’s about having rational conversations and engagements with people and bringing back at the end of the day to a very personal level.” Both Wall and fellow Labour MP Charles Chauvel, who got married to his partner in Canada where the laws would allow, were expecting “dirty tactics” to arise from minority sectors. “While I’m confident and hopeful about us having the numbers to get this legislation through, there will be bitter opposition to it from a minority, but a vocal and sometimes nasty minority,” Chauvel said. For DDoS protection, contact DOSarrest a result of five years of research, experimentation and mitigation of malicious traffic. In the last four years, we have formed a dedicated team of network security specialists, network engineers and developers focused on mitigating DoS/DDoS attacks. Solving the DDoS problem is like a never ending cat and mouse game with attackers. Click Here to Contact Us! Source: http://www.stuff.co.nz/national/7385038/Family-First-site-back-online-after-attack

View original post here:
Family First site back online after Distributed Denial of Service ‘DDoS’ attack

Demonoid Faces Prolonged Downtime After Distributed Denial of Service ‘DDoS’ attack

A severe DDoS attack has brought down one of the most famous BitTorrent trackers. Demonoid has been inaccessible to its millions of users for more than a day and is expected to remain offline for quite some time. The tech admin of the troubled BitTorrent tracker told TorrentFreak that the issues at hand are not easy to fix, and suggests that aside from the DDoS there might have been an attack from another angle. Demonoid is one of the biggest torrent sites around, and has been for more than half a decade. Over the years the site has had its fair share of downtime, sometimes disappearing for months on end. Yesterday, a million plus Demonoid users noticed that they could no longer access the site. Instead of the usual welcome screen users were confronted with a “server busy” message, suggesting that the BitTorrent tracker is facing technical difficulties. TorrentFreak got in touch with the tech admin of the site who informed us that they are in serious trouble. Demonoid was overloaded by a DDoS attack which hit the server hard, resulting in a series of problems that may take a while to address. “It started as a DDoS but then it caused a series of problems. These problems need to be fixed before the site can go back up, and it’s a complicated fix this time,” the Demonoid admin told TorrentFreak. Aside from the DDoS assault, Demonoid’s server may also have been compromised by another attack. “There might have been an attack from another angle, an exploit of sorts, but it’s hard to tell right now without a full check of everything,” the admin says. While Demonoid is determined to return to its full glory, it might take a while before the site is up and running again. After an exodus of staff earlier this year there is only one person available to work on server issues, so progress is slow. “Our human resources became limited in the last few months. All tech issues are handled just by me now and there is no one else to take the job,” the admin told us, adding that his time is also limited by real life issues that take priority. “I’ll fix the site as soon as possible, but it might be a while this time,” the admin says. In recent years Demonoid has been in the cross-hairs of several anti-piracy outfits. It was pressured to move out of Canada by the CRIA and most recently the MPAA and RIAA reported Demonoid as a “rogue site” to the U.S. Government. However, there is no indication that the current attacks at Demonoid are anti-piracy related. For the millions of Demonoid users there’s no other option than to wait, once again. For fast DDoS protection click here . Source: http://torrentfreak.com/demonoid-to-suffer-prolonged-downtime-after-ddos-attack-120727/

Read More:
Demonoid Faces Prolonged Downtime After Distributed Denial of Service ‘DDoS’ attack

Distributed Denial of Service ‘DDoS’ attack on Online websites

As more enterprises push services online, IT executives should be wary of the legal risks which could occur if they are subject to a distributed denial of service (DDoS) attack, finds Hamish Barwick. It could be an IT executive’s nightmare — finding out the company website has been hit with a distributed denial of service (DDoS) attack and can’t be accessed by customers. Both customers and management are demanding to know what’s happening. And worse still, there is evidence that customer data has been compromised. It’s at that time that an IT security contingency plan begins to pay off. For Middletons partner, Mark Feetham — who specialises in ICT law — having a contingency plan in place before the worse happens can help companies avoid loss of business or a potential lawsuit. “Companies that fail to do any planning to address a DDoS threat may be exposed to a negligence claim if an attack is launched against it which causes a third party to suffer a security breach, data or privacy loss,” he says. This IT security contingency plan could include taking proactive steps to ensuring that proper logging is configured in all security devices, so that in the event of an attack, the log data can be examined and handed over to law enforcement agencies. In addition, having a security awareness program developed by the CIO and distributed to all staff members was needed. “Education and awareness of security threats throughout any organisation is key to minimising threats and reducing risk,” Feetham says. He also warns that companies that use Cloud computing services may also be at risk as a DDoS attack could limit or preclude access by the company to its own data or business applications. “Organisations considering Cloud computing as an option must carefully balance the issues against any identified cost saving associated with a switch to Cloud,” Feetham says. “Adequate due diligence on a prospective provider and careful consideration of the terms of the Cloud services contract are strongly recommended.” Gilbert + Tobin’s Andrew Hii says any negligence claim following a DDoS attack will be determined by what the company has done to protect its data. “If the DDoS attack was to stop people from using that website to perform a transaction and those people suffered losses as a result there might be the potential for a negligence claim to be brought against the company,” he says. Regardless of DDoS attacks, Hii adds that companies should make sure that any Cloud provider they go with has in place sufficient security measures. “Insuring that any Cloud provider or outsourcer has best practice standards goes a long way to dealing with those risks,” he says, If the negligence case makes it to court, than having evidence which shows the company’s obligation to its customers is essential, according to Hii. “Record keeping is just as important in any case where a company may be exposed to this kind of liability.” Source: http://www.cio.com.au/article/430050/avoiding_negligence_claims_online/

View original post here:
Distributed Denial of Service ‘DDoS’ attack on Online websites

FBI warning Web Users on July 9th possible Distributed Denial of Service ‘DDoS’ attack

When the U.S. Federal Bureau of Investigation (FBI) publicly announces a possible catastrophic event, people should better pay attention. There’s big news that a huge number of people around the world might suffer “Internet Blackouts”, meaning, they won’t be able to access the Web at all on their computers starting July 9, 2012. This Denial Of Service (DOS)-type scheme is related to a computer Trojan called DNS Changer Malware. This type of malware performs some illicit activity on the computer system when it is run and can allow somebody from a remote site to take control of another computer. When you’re infected by this DNS Changer, it changes your computer’s Domain Name Server (DNS) to replace your ISP’s provided good DNS servers with rougue DNS servers operated by the DNS Changer author or criminal, in order to divert traffic to fake and illegal sites on the Web and steal your personal informations such as credit card numbers, passwords and usernames, among other things. In November of 2011, in their “Operation Ghost Click”, the FBI successfully shut down the DNS Changer Botnet using a number of their own DNS servers just to maintain the DNS services of millions of unsuspected victims around the world. This would expire on July 9, 2012. The DNS Changer Malware is targeting Windows PCs to other platforms that include the Mac OS and home routers as well. Mobile devices may also be affected. Meanwhile, a technology news blog has written some helpful information on how to check if your computer is affected by this rogue malware and what steps you can do to prevent and get rid of this menacing DNS Changer Malware infection on your computers. The FBI claimed and admitted that they organized a very unusual system to combat this Trojan malware in the private and Internet domain. While this is the first time the U.S. government intervened to such a problem, the FBI said it wouldn’t be the last of it. Source: http://technorati.com/technology/article/fbi-to-web-users-many-could/

More:
FBI warning Web Users on July 9th possible Distributed Denial of Service ‘DDoS’ attack

Distributed Denial of Service ‘DDoS’ blackmailers busted in cross-border swoop

Cyber hoodlums targeted gold and silver traders Chinese and Hong Kong cops are hailing another success in their cross-border cyber policing efforts with the scalp of a high profile DDoS blackmail gang which targeted gold, silver and securities traders in the former British colony. Six cyber hoodlums were arrested on the mainland in Hunan, Hubei, Shanghai and other locations at the end of June, according to a report in local Hong Kong rag The Standard. Some 16 Hong Kong-based firms including the Chinese Gold & Silver Exchange were targeted in the scheme designed to blackmail them to the tune of 460,000 yuan (£46,200). The gang apparently threatened to cripple their victims’ web operations with distributed denial of service (DDoS) attacks if they didn’t cough up. Four of the targeted firms transferred funds totalling 290,000 yuan (£29,150) into designated bank accounts in mainland China, the report said. A source also told The Standard that some of the victims may have been involved in some shady dealings themselves, which made them more reluctant to seek police help. Roy Ko, centre manager of the Hong Kong Computer Emergency Response Team (HKCERT) told The Reg that the arrests are an indication of improving cross-border cyber policing efforts. “Working with counterparts cross border is always a challenge because of different practices, languages, different time zones and so on. Usually, HK and the mainland maintain a good working relationship, just like the HKCERT and CNCERT,” he said. “Because we are in the same time zone, the response is usually quicker than working with the US, for example, where we have to wait until the next day to get a response.” Ko also warned that the attacks show this form of cyber threat is still a popular one for avaricious criminal gangs. “Firms have to assess whether they are a probable target of such an attack – ie whether they rely heavily on the internet to do business – and then prepare countermeasures,” he added. “Subscribing to an anti-DDoS service may be part of the protection strategy in addition to anti-malware, firewall, etc.” Hong Kong businesses have been warned before that they’re fair game to hackers from neighbouring China. Source: http://www.theregister.co.uk/2012/07/04/hong_kong_china_bust_ddos_gang_blackmail/

Excerpt from:
Distributed Denial of Service ‘DDoS’ blackmailers busted in cross-border swoop