Feeds

Zombies are attacking America – researchers

Banking sector DDoSers 'used botnets', say security boffins

The Essential Guide to IT Transformation

Hackers responsible for an ongoing series of attacks against US banks over the past week may be tapping into botnets to power their assaults, according to security researchers. Meanwhile, the Financial Services ISAC (Information Sharing and Analysis Center) continues to advise banks to be prepared for attack.

Bank of America, Citigroup, US Bancorp, JPMorgan Chase, Wells Fargo and PNC have all been hit by DDoS attacks for which hacker group the Izz ad-Din al-Qassam Cyber Fighters took credit via a series of posts to PasteBin. The hacktivist group claimed its actions had been prompted by indignation over the Innocence of Muslims, an amateur anti-Islamic film whose trailer had appeared on YouTube. The same film has also provoked riots and attacks on Western diplomatic missions across the world.

The DDoS attacks have been responsible for intermittent disruption and slowdowns for bank customers trying to use the targeted websites.

The group has rallied for more hacktivists to back the cause. One of the posts calls for volunteers to visit sites which then generate attacks from visitors' PCs which are directed at targeted US banking sites. Jaime Blasco, a security researcher at AlienVault, told The New York Times that this attack method alone doesn't account for the severity of cyber assaults that have been directed against US banks.

Blasco said attackers "must have had help from other sources" such as someone with access to botnet networks of compromised PCs or contacts in a well-resourced group, such as a nation state. One of the members of infamous hacktivist crew LulzSec allegedly owned a botnet used in its attacks, providing a zombie attack precedent of sorts.

Independent US Senator Joe Lieberman told NBC during a television interview that he believed Iranian government sponsored hackers were involved in the attacks, suggesting the country's involvement was motivated by a desire to retaliate against Stuxnet and related attacks against Iran's nuclear programme. Gholam Reza Jalali, the head of Iran’s Passive Defense Organization, who is in charge of the country's cyber programme, has denied these claims, which remain unsubstantiated.

Hacktivist statements associated with the ongoing attacks on US banks demand the erasure of the Innocence of Muslims from the interwebs.

The Financial Services ISAC raised its cyber threat level to "high" on 19 September, around the time of the first attacks targeting Bank of America, and the net attack risk outlook remains at the organisation's second-highest state of alert.

Dan Holden, director of research at Arbor's Security Engineering and Response Team (ASERT), said the attacks were almost certainly powered by botnets.

"This attack has generated enormous amount of attention because it was telegraphed in advance, putting these firms on notice," Holden told El Reg. "That has led to great media interest and frankly, some pretty wild speculation about motives and attack techniques.

"Arbor does not believe that this was an opt-in only attack, but one driven heavily by botnets as well. This incident shows the need for businesses to take a proactive approach to the issue of network availability. Trying to fix your roof when it's raining is not pleasant experience." ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.