Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Geek, I am your Father.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. Smart Defrag
2. GS Auto Clicker
3. Macrium Reflect FREE Edition
4. Sergei Strelec's WinPE
5. MusicBee
6. Visual C++ Redistributable Runtimes AIO Repack
7. K-Lite Mega Codec Pack
8. ImgBurn
9. Unlocker
10. Fortect
More >>

top reads

Star 8 Windows Shortcuts That’ll Make You More Productive and Save You Time

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025


MajorGeeks.Com » News » September 2012 » 'Historic' DDoS Attacks Against Major U.S. Banks Continue

'Historic' DDoS Attacks Against Major U.S. Banks Continue


Contributed by: Email on 09/27/2012 03:12 PM [ comments Comments ]


PNC Bank appears, as promised, to be the latest victim of hacktivists carrying out denial-of-service attacks against major U.S. financial services institutions. PNC, out of Pittsburgh, joins Wells Fargo, J.P. Morgan Chase & Co. and Bank of America on a list of banks taken offline reportedly by a group who claimed responsibilities for the attacks as retaliation for the portrayal of Muslims in “Innocence of Muslims,” a series of movie trailers uploaded to YouTube.

The group, using the name Mrt. Izz ad-Din al-Qassam Cyber Fighters, promised in a message hosted on Pastebin to takedown PNC today. As of 3 p.m. ET, PNC’s sites were unreachable. Wells Fargo had been the latest institution attacked; on Tuesday, customers complained of intermittent outages and difficulty in reaching their online bank accounts, bank officials said in a statement on its Twitter account.

PNC spokeman Fred Solomon told Threatpost the bank experienced a higher than usual volume of traffic yesterday, and that it had ramped up today.

"Traffic to our sites is heavy today and it's of a similar pattern to that seen by other banks of late," Solomon said.

One security expert, however, is at odds with the group’s claim its actions are a protest of the movie trailers. Dmitri Alperovich, cofounder and CTO of security company CrowdStrike, called the theory a red herring.

“I don’t buy that their motivation is in response to the video; this group has been carrying out attacks for months,” he said. “Their motivation is to send a message that this is what they’re capable of.” Alperovich said the group’s name is the same as the military wing of Hamas and it claims to have a Jihadist cause, he said. “If a terrorist group is interested in sending a message to us, this is one way of doing so. It’s relatively inexpensive and powerful message.”

Since the attacks began against major U.S. banks last week, many theories have surfaced as to the motivations behind the attacks, one being that the attacks were a cover for a string of wire transfer fraud heists. The FBI and the Financial Services ISAC warned 10 days ago that cybercriminals were using spam and phishing emails pushing keyloggers and remote access Trojans to attack financial institutions. Stolen credentials had been used to steal hundreds of thousands of dollars, as well as tamper with user accounts.

Sen. Joe Lieberman (D-Conn.) then last week raised the stakes in a C-Span interview, blaming Iran for the attacks, a claim the Iranians quickly refuted. Lieberman theorized a secret military unit called the Qud Force initiated the attacks because of U.S. sanctions imposed on Iran because of its nuclear program. The head of Iran’s civil defense organization told the Fars News Agency Iran was not behind the attacks.

Some of the denial-of-service attacks against the banks have involved massive amounts of traffic, up to 100Gb/second; experts say most DDoS attacks require 5-10 Gb/second of traffic to take down a site.

“These are no super sophisticated attacks, but we’re seeing very large, almost historic, attacks from the standpoint of the volume of traffic we’re seeing, “ Alperovich said. “And these banks are not tiny. They have massive infrastructures and they’re coming under DDoS attacks regularly. The fact that these attacks are able to shut them down is quite remarkable.”

Alperovich said the attackers likely spend months building the botnet infrastructure behind the attacks.

“Banks have high bandwidth connections into their data centers. They can take a lot of traffic, plus they all use security and DDoS protection services,” he said. “This is massively higher than what we see on a normal basis.”

Organizations susceptible to DDoS attacks, such as banks, gambling sites and others where availability is a must, often enlist the help of service providers to get the additional bandwidth and capacity needed to handle traffic. They also benefit from intelligence from ISPs and security service providers who may be able to pinpoint a range of IP addresses from which attacks originate. Victims can then block those addresses at the router or switch level on a network, and still allow legitimate traffic through.

“Cybercriminals tend to use DDoS for ransom or blackmail; we see regular attacks on gambling and sports sites say right before the Super Bowl and criminals will demand a ransom,” Alperovich said. “That is not the case here. In the past, we’ve seen hacktivist groups tend to give up easily. If they’re nation-state sponsored—and I’m in no way saying these attackers are—they may continue for a while.”

Until today, the banks under attack have suffered periodic outages and have been able to make sites and services available fairly quickly, limiting the impact to customers and business.

“The headlines may be scary, but it’s important to note, no banks have been breached, no data stolen,” Alperovich said. “We have to keep that context in mind. At most, this has been an inconvenience for users who have not been able to do their online banking. You can still go to the ATM or the branch office. The banking infrastructure is not under attack.”






« Analysis Shows Some URL Shorteners Often Point to Untrusted Websites · 'Historic' DDoS Attacks Against Major U.S. Banks Continue · Daily Reviews Summary 09/28/12 @ NT Compatible »




Comments
comments powered by Disqus

MajorGeeks.Com » News » September 2012 » 'Historic' DDoS Attacks Against Major U.S. Banks Continue

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition