Attack MitigationBotnetsDDoS AttacksSecurity

Darkness (Optima) – DDoS for Hire

March 20, 2012 — by Yotam Ben-Ezra0

A clear trend in the security scene these days is the change in attacker profile. Computer hacking and DDoS attacks are no longer reserved for the small group of individuals who are familiar with the “bits and bytes” of underlying technologies. Today’s attackers may very well be ordinary computer users.

This is a result of an abundance of tools out there which do not require technical abilities surpassing the normal usage of a program, or simply the supplying of a credit card. A recent example is the Anonymous-OS which has been recently released. This is an Ubuntu- based OS which is pre-installed with all the necessary, and easy to use tools for the novice Anonymous member.

Attack MitigationDDoS AttacksSecurity

Has Anonymous Really Developed an Ubuntu-based Operating System?

March 15, 2012 — by Dennis Usle0

Here’s an interesting, new twist to the Anonymous saga:  Someone apparently has developed an Ubuntu distribution with Anonymous iconography and preloaded tools such as HOIC, JTR, Pyloris, SQL Poison, etc.

With 4500+ downloads already it’s still unclear as to who actually authored the O/S.  However, with the reported overhead of supporting the novice followers using BackTrack and other DDoS attack tools it wouldn’t surprise me if this is an attempt to ease the technical support burden of Anonymous.

DDoS AttacksSecurity

Anonymous Attacks – You Don’t Need a Big Crowd in Order to Take Down a Website

March 9, 2012 — by Ronen Kenig0

In the past year we used to see large campaigns by the anonymous group before launching a cyber attack. The purpose of the campaign is mainly to recruit additional members and volunteers to amplify the DDoS attack and to generate large volume of traffic in order to shut down the victim’s website and online services.

However, this pattern might have changed.  Last week attacks that were launched by Anonymous on several Italian organizations reveal a new behavioral pattern for the hacktivists group:

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksPhishing

5 Questions About Anonymous’ New DDoS Techniques

January 24, 2012 — by Carl Herberger3

In case anyone missed this news, Group Anonymous has put up code at (a free and anonymous HTML code-hosting site) which uses your web browser to launch LOIC DDoS attacks.

Here’s a quick synopsis from the Computerworld report:

“According to Cluley, members of Anonymous distributed links via Twitter and elsewhere that when clicked automatically launched a Web version of LOIC and attacked predefined victims. The links pointed to a page on which in turn executed some JavaScript to fire LOIC at Anonymous-designated targets.”

Application SecurityAttack MitigationBotnetsBrute Force AttacksBusiness ContinuityCloud ComputingComplianceDDoS AttacksHTTP Flood AttacksMobile SecurityPhishingSecurity VirtualizationSEIMVoIPWAN OptimizationWeb Application FirewallWire-line

Lesson Learned: ISPs & CDNs aren’t enough for Anti-DDoS

January 18, 2012 — by Carl Herberger5

Well, I suppose that many in the Hacktivist world have resolved that 2012 would be a ‘breakout’ year for them as the level of attack activity is above the record setting year of 2011’s Cyber Attacks! Whether it is the Anonymous Group joining the Occupy Wall Street protesters to launch cyber attacks on major financial institutions in New York, or the Nightmare group, working with the hacker “0xOmar” to escalate their cyber war against Israel, cyber attacks have become the weapon of choice for ‘hacktivists’ seeking to leverage the impact of conflicts and social protests.