The Register® — Biting the hand that feeds IT

Feeds

Zombie PCs are for crimelord chumps: Fear clusters, says infosec ace

Big Data tech can be used for 'carpet bombing' the internet

Supercharge your infrastructure

It may be possible for a "single dedicated attacker" to run an internet "carpet-bombing" attack by applying Big Data and distributed computing technologies, security researcher Alejandro Caceres warns.

The traditional botnet, or network of hijacked computers, has been used for distributed computing problems, such as Bitcoin mining or DDoS attacks, for years.

But now attacking hundreds of thousands or even millions of targets at once – such as IP addresses or web applications – can be done using cheap hardware, open-source tools and a standard internet connection.

An attacker could potentially run an attack using a distributed Hadoop cluster using either cloud services (such as Amazon's Elastic MapReduce) or commodity hardware, Caceres explained during a presentation at Def Con earlier this month.

The platform for the attack would be a cluster of machines or a cloud-based system rather than a botnet of compromised machines, said Caceres.

Botnets have been the main vector of cybercrime for more than a decade, so the possibility that a different approach might be brought into play is possibly as significant as when spammers switched from using open mail relays to malware-infected PCs.

"This is not using a botnet. Botnets are generally 'dumb' systems used for DDoS or other similar attacks using compromised systems," Caceres, owner of software development firm Hyperion Gray and founder of the PunkSPIDER project told El Reg.

"What I'm talking about here is building your own distributed cluster of machines at home or in the cloud and using them for highly coordinated, complex attacks," he added.

Potential attacks could be geared towards hacking websites, stealing data or spreading malware, among other possibilities.

'Extremely effective' in tests

During a presentation of his research at Def Con, Caceres explained how automated, distributed SQL injection tool might be run over an Apache Hadoop cluster. Tests showed this approach to be "extremely effective" against a large test bed of websites. "We were able to inject 61 targets in just 45 seconds (typically a SQL injection attack on a single target would take at least 1 minute if done in a non-distributed way)," Caceres explained.

Caceres also demonstrated two other open-source custom-written distributed computing attack tools during the same talk.

One of them is a new version of PunkSCAN (the scanner that powers PunkSPIDER) for distributed vulnerability location and reconnaissance. The second is PunkCRACK, a distributed password-cracker that can be used over a Hadoop cluster, and would be suitable for applications such as distributed post-exploitation analysis.

Leveraging "Big Data" technology allows us to greatly reduce the time required to conduct a well-coordinated attack on a large number of targets in general, according to Caceres.

5 ways to prepare your advertising infrastructure for disaster

Whitepapers

5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Email delivery: Hate phishing emails? You'll love DMARC
DMARC has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name..
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Email delivery: 4 steps to get more email to the inbox
This whitepaper lists some steps and information that will give you the best opportunity to achieve an amazing sender reputation.

More from The Register

next story
Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
Anyone can touch your phone and make it give up its all
NSA in new SHOCK 'can see public data' SCANDAL!
What you say on Twitter doesn't stay on Twitter
Hundreds of hackers sought for new £500m UK cyber-bomber strike force
Britain must rm -rf its enemies or be rm -rf'ed, declares defence secretary
Would you hire a hacker to run your security? 'Yes' say Brit IT bosses
We don't have enough securo bods in the industry either, reckon gloomy BOFHs
UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
Something like Jack Bauer's 24 ... whatever it'll take to teach kids how to bat away hackers
Sweet murmuring Siri opens stalker vulnerability hole in iOS 7
'Siri, hand over my contacts and history now…'
London schoolboy cuffed for BIGGEST DDOS ATTACK IN HISTORY
Bet his parents wish he'd been playing computer games
RSA: That NSA crypto-algorithm we put in our products? Stop using that
Encryption key tool was dodgy in 2007, and still dodgy now
The NSA's hiring - and they want a CIVIL LIBERTIES officer
In other news, the Spanish Inquisition want an equal opprtunities officer
prev story