Feeds

Muslim vid protest hackers turn web-flood hosepipe away from US banks

But Iran not behind DDoS attacks, say security bods

Providing a secure and efficient Helpdesk

Islamist hackers busy blasting bank websites with network traffic have suspended their assault after a controversial anti-Muslim video ceased to be available through YouTube.

The Izz ad-Din al-Qassam Cyber Fighters crew launched a series of distributed denial-of-service (DDoS) attacks in September and December, with the stated aim of protesting against extracts of the Innocence of Muslims film appearing on Google's video clip site.

The search giant restricted the availability of the video in some countries following a wave of protests across the Middle East. The footage did not actually violate YouTube policies so it remained available to most, prompting the Izz ad-Din al-Qassam Cyber Fighters to launch packet-flooding attacks against Wells Fargo, Bank of America, Citibank and many other US banking organisations.

The assaults caused partial service disruption in some cases and may have spilled over to affect the website operations of European banks.

Earlier this month, US intelligence types told news reporters that the Iranian government was behind the "sophisticated" attacks.

But information security experts said the theory was unsubstantiated by any technical evidence and probably just hawkish sabre-rattling. The attacks involved hijacking thousands of compromised servers, rather than using a botnet of compromised home PCs, and generating huge volumes of traffic, reaching peaks of 75Gbps at times.

The security boffins said that compromised PHP web applications and insecure Wordpress installations powered the flood, which was directed using a hacker tool called Itsoknoproblembro.

There's no need to introduce a nation state to explain this type of attack, a point explained in some detail by Robert Graham of Errata Security here.

'Clear indication of progress and establishment of logic'

In any case, the Izz ad-Din al-Qassam Cyber Fighters crew suspended its campaign on Tuesday. In a message on Pastebin, the group said the "main copy of the insulting movie was removed from YouTube" describing this as a "clear indication of progress and establishment of logic instead of obstinacy".

The hacktivists said that, in response, they were downing DDoS tools even though copies of the trailer for the film continue to be available from YouTube.

"All of them needed to be removed. Meanwhile, we will control the situation constantly and closely and will adopt the correct decision according to the future circumstances," the group said. "The suspension of Operation Ababil has started today and will continue till further notice."

It's unclear whether or not Google has actually done anything. It's quite possible that the Izz ad-Din al-Qassam Cyber Fighters have decided to call a halt to their DDoS operations for some other reason and the group are trying to spin this as a victorious conclusion to a principled campaign.

From a Western perspective, there's no link between banks and online outlets such as YouTube. However cultural norms in the Middle East, where the state often controls media outlets and sometimes runs the banks, are very different, a factor that goes at least some way to explaining why Muslim activists would target financial institutions rather than the source of their displeasure. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.