Feeds

Anonymous cell: Shove off, credit-hoggers, WE took down HSBC

Hacktivist splinter group claims responsibility for packet flood

Top 5 reasons to deploy VMware with Tegile

Updated An Anonymous-affiliated group has claimed responsibility for attacks that left HSBC websites worldwide knocked offline on Thursday night.

UK-based Fawkes Security claimed responsibility for the digital sit-in via a post to Pastebin.

As some of you may be aware HSBC bank suffered several DDoS attacks on the named sites in the past hours us.hsbc.com hsbc.co.uk hsbc.com hsbc.ca they were all brought down by #FawkesSecurity. Before any claim fags attempt to take ownership of this attack, the proof is all in our Twitter account, Targets, time and date :) @FawkesSecurity

Several posts in @FawkesSecurity's timeline (such as this) provide circumstantial evidence to support its claim that it launched what it variously describes as #OpHSBC and #OpDosLikeABoss. In a YouTube video the group said it was holding back on its reason for the attack.

Previously it was thought that HSBC was hit by Muslim hacktivists as part of a threatened extension of their campaign of denial of service attacks against US banks last month in protest against the controversial Innocence of Muslims video pulled from YouTube. This is now looking much less likely.

In a series of statements, HSBC said that it managed to restore normal access to internet banking services as all its affected websites (in the US, Canada and the UK) by 03.00 BST on Friday, 19 October. It stressed that customer data was never at risk.

Some reports suggest purchases using debit cards issued by HSBC might also have been affected, but this remains unconfirmed.

Security experts are beginning to analyse the attack, with early indications suggesting it was probably a mixture of brute-force flooding as well as more sophisticated application-layer attacks. Zombie bots are a likely source of the attack traffic, if recent experience is anything to go by, but this too remains unconfirmed.

FawkesSecurity has been in touch since this story was published, and told El Reg in a Twitter exchange: "We'll be targeting other banks in the future, as well as any other sites we see worth attacking."

Asked why it was interested in targeting banks, FawkesSecurity said "It's their fault that the worlds economics are so messed up".®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.