Feeds

Congressman calls for 'cyber-reprisals' against North Korea

Modern day General Ripper frets over phantom threat

Using blade systems to cut costs and sharpen efficiencies

A Republican congressman has urged the US to unleash a retaliatory cyber-attack against North Korea over DDoS attacks supposedly launched against US and South Korean websites.

Congressman Peter Hoekstra of Michagan, the lead Republican on the House Intelligence Committee, urged President Obama to mount a "show of force" against North Korea over its alleged role in cyberattacks last week.

Hoekstra made the call to fire up the cyber-equivalent of B-52 bombers despite absolutely no evidence that the impoverished, hard-line communist state is involved in the assault. This lack of evidence didn't prevent Hoekstra from warning about possible "cyber-geddon" if the US failed to act on last week's attacks.

If action is not taken, he said during an appearance on American radio show, "next time they'll go in and shut down a banking system...or manipulate the electrical grid either here or in South Korea. Or they will try and miscalculate, and people will be killed."

Graham Cluley, senior technology consultant at security firm Sophos described Hoekstra's call to cyberarms as "complete nonsense" and without any justification.

"No evidence has been produced showing that the government of North Korea are behind the denial-of-service attacks," Cluley argued. "A hacker can be based anywhere on Earth and command a worldwide botnet to bombard websites with traffic."

"If Hoekstra has been advised by internet experts that the attacks definitely came from North Korea, I would politely suggest that he finds himself some new internet experts," he added.

Alex Eckelberry, chief exec of Sunbelt Software, backs up the assessment that North Korea stands falsely accused of launching last week's assault.

"I know of not a shred of evidence that this bot is from North Korea. It would take considerable research to ascertain the original source (the relevant IPs to the malicious code are in several places — Florida and Germany)," he writes in a blog posting criticising media "hysteria" over the attacks.

Cyber-twerp

It's not the first time Hoekstra has flaunted his lack of tech savvy or apparent ignorant of information security issues in public. Earlier this year, he unwisely used Twitter whilst in a helicopter over Baghdad, potentially exposing himself and the crew to a heightened risk of attack by giving away his movement during an official visit, Sophos adds.

A later Tweet inappropriately comparing the internet clampdown in Iran to the hammering dispensed by US voters against the Republicans last year sparked even greater ridicule, and it spawned a satire blog entitled Pete Hoekstra is a Meme dedicated to tracking the Dutch-born politician's gaffes.

In contrast to Hoekstra, security analysis of the attack has revealed that they were neither potent nor sophisticated. The attack was launched from machines infected by a variant of MyDoom and never got beyond a basic PING Flood, as explained by security researcher Ariel Silverstone here. Attacks that started against US hosts (affecting the FTC, FAA and Treasury in particular) on 4 July began focusing on South Korean government and e-commerce websites later last week, where they caused still more problems.

A write-up by Shadowserver containing a full list of attacked sites can be found here.

Glass jawed websites KOed by basic assault

The attacks themselves were more Dad's Army than Terminator.

Arbor Networks reckons the volume of spurious data associated with the attacks reached only 39 Mbps on average peaking at 182Mbps, orders of magnitude less than recent attacks.

Jose Nazario, a security researcher at Arbor Networks, describes the assault as a garden variety attack of a volume that might easily be filtered out.

Although the attack was a featherweight - rather than the heavyweight early reports might have suggested - it still leaves awkward question about why some sites (which might be described as "having a glass jaw") were knocked out by it.

This botnet will self-destruct in seven seconds...

Earlier analysis suggested anywhere between 50,000 to 200,000 infected machines - depending on who you asked - were associated with the attack. These compromised machines were due to download a software component that overwrote data on Friday, effectively paralysing infected systems, according to a detailed analysis of the malware here).

Symantec, more succinctly, describes the threat as an “old school time bomb” in its write-up here.

According to The Washington Post, the South Korean CERT is reporting that infected PCs are "self-destructing," though it's unclear how frequently this is happening. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.