iTnews

Mass attacks on government and financial sites continue

By Chuck Miller on Jul 9, 2009 11:22AM
Mass attacks on government and financial sites continue

Researchers remain unsure of the source of an ongoing distributed-denial-of-service (DDoS) attack that is affecting a number of US and South Korean government websites, along with financial institutions, such as the New York Stock Exchange and NASDAQ sites, as well as various military sites and the Washington Post.

The attack may have started during the July 4 weekend, but seemed to have peaked yesterday, Rick Howard, intelligence director for VeriSign iDefense, told SCMagazineUS.com.

One of the hardest hit government sites was the US Federal Trade Commission's, but other US government sites have been able to mitigate the effect.

“Most of the US government sites have handled it without too much of a problem,” Howard said. “But there have been problems on the South Korean side.”

The code itself is not new or particularly sophisticated. It seems to be a variant of the MyDoom worm that first hit in 2004.

“We have a copy of the malicious code that is doing it. It is not that exciting in terms of new and interesting things – it's a middle-of-the-road DDoS attack trojan,” Howard said. “There may not even be a command-and-control server involved – the payload may be delivered by email.”

Some security experts have estimated the number of compromised computers hosting the malware at between 30,000 and 60,000. Also, the code may bundle a number of different modules.

“The malicious code drops several different components and is composed of many different files,” Luis Corrons, technical director at PandaLabs, told SCMagazineUS.com. “One of the files has a list of URLs to be attacked hard-coded in it -- so the attackers are not dynamically configuring the attack.”

Though many reports claim it is coming from North Korea, it's too soon to pinpoint exactly who is behind it.

“It's not hard to mitigate a DDoS – it's expensive — though not hard to do,” said Howard. “But it is hard to attribute the attack to a specific origin.”

And few clues yet exist to help make a determination, though forensic efforts are ongoing.

“The malware itself does not give any clue as to who is doing this,” Corrons said.

There are a number of theories, however, on where the email bearing the malicious payload physically originated.

“There was a report that ground zero – the place where the emails were launched from -- is somewhere east of Seoul,” Howard said. “But that is purely speculative at this point.”


See original article on scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
denial dos financial government hack hackers korea nasdaq nyse post security service south us washington websites
In Partnership With
By Chuck Miller
Jul 9 2009
11:22AM
0 Comments

Related Articles

  • Government reveals censorship overhaul, stiff privacy penalties for Digital Platforms
  • US Army examines TikTok security concerns after Schumer's data warning
  • Huawei, ZTE 'cannot be trusted', pose security threat: US attorney general
  • ACSC warns on BlueKeep after cryptojacking exploit detected
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

CBA slammed by RBA for stalling New Payments Platform

CBA slammed by RBA for stalling New Payments Platform

TPG 'contemplates' future of sub-$60 NBN plans

TPG 'contemplates' future of sub-$60 NBN plans

Google tries to smash smishing in Messages

Google tries to smash smishing in Messages

NBN Co challenges Australia's $60 broadband 'sweet spot'

NBN Co challenges Australia's $60 broadband 'sweet spot'

You must be a registered member of iTnews to post a comment.
Log In | Register

Whitepapers from our sponsors

Are you getting profitable outcomes from your IT?
Are you getting profitable outcomes from your IT?
Your Microsoft Security journey starts here
Your Microsoft Security journey starts here
Is your AWS framework well-architected?
Is your AWS framework well-architected?
Why you should  reassess your cybersecurity posture
Why you should reassess your cybersecurity posture
How will you manage the cloud data deluge?
How will you manage the cloud data deluge?

Events

  • Gartner Data & Analytics Summit
  • 3rd Intelligent Automation Sydney Summit
  • 2nd Data Governance & Management Summit Melbourne
  • Technology Risk Management Summit 2020
  • 7th University IT Service Strategy & Challenges
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.