Feeds

Anonymous plans DDoS attack on GCHQ in snoop law protest

Hacktivists hard at work as Home Office site staggers back online

Using blade systems to cut costs and sharpen efficiencies

Analysis The Home Office website is back online following a weekend of disruptive denial-of-service attacks by Anonymous.

The hacktivist collective also launched traffic-flooding assaults against the official website of the UK prime minister, number10.gov.uk, and the UK's Ministry of Justice as part of a protest against the UK's controversial extradition laws. The DDoS attacks, launched during #opTrialAtHome on Saturday night, were motivated by the UK government's treatment of Pentagon hacker Gary McKinnon, Christopher Harold Tappin andTVShack's Richard O'Dwyer in controversial extradition cases, the hacktivists claimed on their official Twitter feed.

"#OpTrialAtHome, because selling your citizens to foreigner is not acceptable! We are #Anonymous, We do not forget, We do not forgive. #UK," Anon_Central tweeted.

In a statement, the Home Office confirmed the attack but downplayed its significance.

The Home Office website was the subject of on online protest last night [Saturday]. This is a public facing website and no sensitive information is held on it.

There is no indication that the site was hacked and other Home Office systems were not affected.

Further attacks against UK government sites might be expected. "#OpTrialAtHome EXPECT US...!!! Every Saturday as this is just the beginning KEEP FIRING," UKAnonymous2012 tweeted. The account named GCHQ as a target for follow-up attacks on 14 April, this time protesting a proposed tightening of internet surveillance regulations.

Denial-of-service attacks are illegal, and participation in such attacks carries the risk of criminal prosecution, net security firm Sophos adds. One formerly favoured tool among hacktivists, the Low Orbit Ion Cannon, exposed the IP addresses of participants in packet-flooding attacks, as several accused hackers have learned to their cost.

Janis Sharp, Gary McKinnon's mum, urged net users not to become involved in hacktivist protests, however strong their feelings might be.

"I agree with the Home Office that it was a huge online protest. On Twitter Anonymous said it was in support of Gary, Richard O'Dwyer and Chris Tappin and against extradition, and was pro [the idea of] people who were in the UK during their alleged crime being tried in the UK ... I obviously agree with the sentiments," Sharp told El Reg

"As these sorts of protests causing a system to overload can come from people from all over the World joining in, they're difficult if not virtually impossible to stop.

"However I don't want other people – who are possibly young and/or vulnerable – possibly getting prosecuted or even extradited, and I definitely do not want other families going through what we have been through and are still going through. It's difficult to explain just how hard it's been over these past 10 years and everyone should realise the possible consequences they and their families could be facing."

The availability of accessible attack tools is enabling anyone with an internet connection to carry out DDoS attacks, DDoS mitigation specialists Arbor Networks warns. The security tools firm says that the perception that organisations are powerless to defend themselves against a concerted denial-of-service attack is actually quite wide of the mark. "Best practice dictates organisations have both on-premise protection as well as cloud-based protection from a service provider," it advises. ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.