Security Market Segment LS
Wednesday, 26 October 2016 11:02

DDoS attacks against Dyn the work of 'script kiddies' Featured

By

Last week's distributed denial of service attack in the US against domain name services provider Dynamic Network Services is more likely to have been the work of "script kiddies", and not state actors.

Security researchers at threat intelligence firm Flashpoint dismissed reports that linked the attack to WikiLeaks, the Russian government or the New World Hackers group.

Instead, Flashpoint said, it was "moderately confident" that the Hackforums community was behind the attack which led to well-known sites like Twitter, Spotify, Netflix and Paypal being inaccessible on 21 October (US time).

The Hackforums community is an English-speaking one and it was here that the source code for the Mirai malware, that can be used to attack Internet-of-Things devices and take them over for use in a botnet, was released by someone using the pseudonym Anna-Senpai.

Threatpost, part of the Kaspersky Security news service, said the US director of national intelligence, James Clapper, had told the Council on Foreign Relations that it was unlikely that nation-state actors were involved.

Clapper was quoted in The Hill as saying: "That appears to be preliminarily the case. But I wouldn’t want to be conclusively definitive about that, specifically whether a nation state may have been behind that or not."

His claim must be assessed in the light of an earlier 2013 statement that the NSA was collecting any type of data on millions of Americans. It was found to be untrue following the revelations by NSA whistleblower Edward Snowden that precisely the opposite was the case.

Flashpoint director of security research Allison Nixon said that the infrastructure used in the attack had also targeted a well-known video game company.

"While there does not appear to have been any disruption of service, the targeting of a video game company is less indicative of hacktivists, state-actors, or social justice communities, and aligns more with the hackers that frequent online hacking forums," she said.

"These hackers exist in their own tier, sometimes called 'script kiddies', and are separate and distinct from hacktivists, organised crime, state-actors, and terrorist groups. They can be motivated by financial gain, but just as often will execute attacks such as these to show off, or to cause disruption and chaos for sport."

Nixon wrote that Flashpoint assessed with moderate confidence that the most recent Mirai attacks were "likely connected to the English-language hacking forum community, specifically users and readers of the forum 'hackforums[.]net'.

"The personalities involved in these community are known for creating and using commercial DDoS tools called 'booters' or 'stressers'. The hackers offer these services online for pay, essentially operating a 'DDoS-for-hire' service.

"One of the few known personalities that have been associated with Mirai malware and botnets is known to frequent these forums. A hacker operating under the handle 'Anna-Senpai' released the source code for Mirai in early October, and is believed to have operated the original Mirai botnet that was used in the attack against Krebs on Security and hosting provider OVH. The hackers that frequent this forum have been previously known to launch these types of attacks, though at a much smaller scale."

Nixon said the technical and social indicators of the attack aligned more closely with attacks from the Hackforums community.

"These other types of threat actors are unlikely to launch such an attack without a clear financial, political, or strategic objective, and they are very unlikely to launch an attack against a video game company," she pointed out.

"Participants in the Hackforums community have been known to launch DDoS attacks against video game companies to show off their credentials as hackers of skill, or to 'troll' and gain attention by causing disruption to popular services."

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments