Feeds

Anonymous plans DDoS attack on GCHQ in snoop law protest

Hacktivists hard at work as Home Office site staggers back online

Internet Security Threat Report 2014

Analysis The Home Office website is back online following a weekend of disruptive denial-of-service attacks by Anonymous.

The hacktivist collective also launched traffic-flooding assaults against the official website of the UK prime minister, number10.gov.uk, and the UK's Ministry of Justice as part of a protest against the UK's controversial extradition laws. The DDoS attacks, launched during #opTrialAtHome on Saturday night, were motivated by the UK government's treatment of Pentagon hacker Gary McKinnon, Christopher Harold Tappin andTVShack's Richard O'Dwyer in controversial extradition cases, the hacktivists claimed on their official Twitter feed.

"#OpTrialAtHome, because selling your citizens to foreigner is not acceptable! We are #Anonymous, We do not forget, We do not forgive. #UK," Anon_Central tweeted.

In a statement, the Home Office confirmed the attack but downplayed its significance.

The Home Office website was the subject of on online protest last night [Saturday]. This is a public facing website and no sensitive information is held on it.

There is no indication that the site was hacked and other Home Office systems were not affected.

Further attacks against UK government sites might be expected. "#OpTrialAtHome EXPECT US...!!! Every Saturday as this is just the beginning KEEP FIRING," UKAnonymous2012 tweeted. The account named GCHQ as a target for follow-up attacks on 14 April, this time protesting a proposed tightening of internet surveillance regulations.

Denial-of-service attacks are illegal, and participation in such attacks carries the risk of criminal prosecution, net security firm Sophos adds. One formerly favoured tool among hacktivists, the Low Orbit Ion Cannon, exposed the IP addresses of participants in packet-flooding attacks, as several accused hackers have learned to their cost.

Janis Sharp, Gary McKinnon's mum, urged net users not to become involved in hacktivist protests, however strong their feelings might be.

"I agree with the Home Office that it was a huge online protest. On Twitter Anonymous said it was in support of Gary, Richard O'Dwyer and Chris Tappin and against extradition, and was pro [the idea of] people who were in the UK during their alleged crime being tried in the UK ... I obviously agree with the sentiments," Sharp told El Reg

"As these sorts of protests causing a system to overload can come from people from all over the World joining in, they're difficult if not virtually impossible to stop.

"However I don't want other people – who are possibly young and/or vulnerable – possibly getting prosecuted or even extradited, and I definitely do not want other families going through what we have been through and are still going through. It's difficult to explain just how hard it's been over these past 10 years and everyone should realise the possible consequences they and their families could be facing."

The availability of accessible attack tools is enabling anyone with an internet connection to carry out DDoS attacks, DDoS mitigation specialists Arbor Networks warns. The security tools firm says that the perception that organisations are powerless to defend themselves against a concerted denial-of-service attack is actually quite wide of the mark. "Best practice dictates organisations have both on-premise protection as well as cloud-based protection from a service provider," it advises. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.