Feeds

Zombies are attacking America – researchers

Banking sector DDoSers 'used botnets', say security boffins

Website security in corporate America

Hackers responsible for an ongoing series of attacks against US banks over the past week may be tapping into botnets to power their assaults, according to security researchers. Meanwhile, the Financial Services ISAC (Information Sharing and Analysis Center) continues to advise banks to be prepared for attack.

Bank of America, Citigroup, US Bancorp, JPMorgan Chase, Wells Fargo and PNC have all been hit by DDoS attacks for which hacker group the Izz ad-Din al-Qassam Cyber Fighters took credit via a series of posts to PasteBin. The hacktivist group claimed its actions had been prompted by indignation over the Innocence of Muslims, an amateur anti-Islamic film whose trailer had appeared on YouTube. The same film has also provoked riots and attacks on Western diplomatic missions across the world.

The DDoS attacks have been responsible for intermittent disruption and slowdowns for bank customers trying to use the targeted websites.

The group has rallied for more hacktivists to back the cause. One of the posts calls for volunteers to visit sites which then generate attacks from visitors' PCs which are directed at targeted US banking sites. Jaime Blasco, a security researcher at AlienVault, told The New York Times that this attack method alone doesn't account for the severity of cyber assaults that have been directed against US banks.

Blasco said attackers "must have had help from other sources" such as someone with access to botnet networks of compromised PCs or contacts in a well-resourced group, such as a nation state. One of the members of infamous hacktivist crew LulzSec allegedly owned a botnet used in its attacks, providing a zombie attack precedent of sorts.

Independent US Senator Joe Lieberman told NBC during a television interview that he believed Iranian government sponsored hackers were involved in the attacks, suggesting the country's involvement was motivated by a desire to retaliate against Stuxnet and related attacks against Iran's nuclear programme. Gholam Reza Jalali, the head of Iran’s Passive Defense Organization, who is in charge of the country's cyber programme, has denied these claims, which remain unsubstantiated.

Hacktivist statements associated with the ongoing attacks on US banks demand the erasure of the Innocence of Muslims from the interwebs.

The Financial Services ISAC raised its cyber threat level to "high" on 19 September, around the time of the first attacks targeting Bank of America, and the net attack risk outlook remains at the organisation's second-highest state of alert.

Dan Holden, director of research at Arbor's Security Engineering and Response Team (ASERT), said the attacks were almost certainly powered by botnets.

"This attack has generated enormous amount of attention because it was telegraphed in advance, putting these firms on notice," Holden told El Reg. "That has led to great media interest and frankly, some pretty wild speculation about motives and attack techniques.

"Arbor does not believe that this was an opt-in only attack, but one driven heavily by botnets as well. This incident shows the need for businesses to take a proactive approach to the issue of network availability. Trying to fix your roof when it's raining is not pleasant experience." ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.