Attacks/Breaches
2/29/2012
09:19 AM
50%
50%

Anonymous Leaves Clues In Failed Vatican Attack

Researchers at RSA detail a rare glimpse into the specific strategies, tools, and tactics used by Anonymous to infiltrate or take down websites.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
How do hacktivists launch attacks? A new report details an online assault launched in August by the hacktivist collective Anonymous that lasted for 25 days, and which was designed to disrupt a specific event.

The research, released Sunday by data security vendor Imperva on the eve of this week's RSA conference in San Francisco, offers a rare glimpse into the specific strategies, tools, and tactics used by Anonymous in its attempts to infiltrate or take down websites.

While officials at Imperva declined to identify the attacked organization, according to news reports, the attack was launched against a Vatican website. The Vatican likewise declined to confirm the attack, but according to news reports, a church official accidentally sent an email--intended for a colleague--to a journalist that read, "I do not think it is convenient to respond to journalists on real or potential attacks," and that "the more we are silent in this area the better."

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The Anonymous attack was launched under the banner of Operation Pharisee, which began with attacks in South America and Mexico. This particular attack, however, was designed to disrupt a planned visit by Pope Benedict XVI to Madrid as part of World Youth Day 2011. But the attempt to scuttle the Vatican's related website failed, despite the launch of a distributed-denial-of-service (DDoS) attack that saw traffic volumes spike to 34 times their normal level.

Researchers at Imperva had advance warning of the attack, meaning they were able to watch it closely as it unfolded. "The thing that distinguishes hacktivism from financially motivated attackers is that they're loud and they preannounce," said Amichai Shulman, CTO of Imperva, in a meeting at the RSA conference.

Here's how the attack proceeded: During the first phase, Anonymous conducted reconnaissance of the Vatican website, looking for any Web application vulnerabilities they could exploit to access servers and steal data. Attackers used a number of freely available tools, including an Iranian-built automated SQL injection scanner named Havij (literally "carrot" in Farsi, though it's also a common slang term for male genitalia), as well as Acunetix Scanner and Nikto Scanner, which search servers for signs of known vulnerabilities, including SQL injection and cross-site scripting bugs, as well as outdated server software.

Based on those tools requiring their operators to understand the intricacies of Web applications and related vulnerabilities, "the first part was carried out by a small group of professionals," said Shulman.

But the tools were failing to turn up any weaknesses in the Vatican website that attackers could exploit. Accordingly, the attack organizers began a recruitment campaign via Facebook, Twitter, and YouTube, calling on people to join Anonymous in bringing down the World Youth Day website by using the Low Orbit Ion Cannon (LOIC) DDoS tool. Anonymous also made use of a then-new mobile version of LOIC, which was a Web page with JavaScript that would execute a DDoS attack after the page was visited by a mobile device browser.

As noted, the attack lasted 25 days, but interestingly, most of that time was spent conducting reconnaissance or recruiting DDoS participants. "Days 19 to 25 were the actual attack phase, split between application attacks and then DDoS attacks," said Rob Rachwald, director of security strategy at Imperva, in a meeting at the RSA conference.

Shulman said one of the most interesting findings from Imperva's analysis of the attack was the insight into how Anonymous conducts reconnaissance, especially since the topic "is not usually discussed" by Anonymous members, at least in public forums. What was also notable was that the group only launched a DDoS attack after failing to find known Web application vulnerabilities to exploit. That, in turn, suggests that many Anonymous DDoS attacks are only launched after--and in cases when--the group fails to find known application weaknesses to exploit. "Our research ... shows that Anonymous will try to steal data first and, if that fails, attempt a DDoS attack," he said.

Another finding was that while an open call was made for people to join the Anonymous DDoS attack, the initial reconnaissance phase was conducted by a relatively small number of "sophisticated hackers," according to the Imperva report. That, in turn, squares with some analyses of Anonymous, which suggest that the core group is composed of a relatively small number of people.

"Anonymous is a handful of geniuses surrounded by a legion of idiots," Cole Stryker, an expert on the anything-goes 4chan message boards who's researched Anonymous, told the New York Times. "You have four or five guys who really know what they're doing and are able to pull off some of the more serious hacks, and then thousands of people spreading the word, or turning their computers over to participate in a DDoS attack."

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
davesg
50%
50%
davesg,
User Rank: Apprentice
3/2/2012 | 2:17:26 PM
re: Anonymous Leaves Clues In Failed Vatican Attack
As with any organization: "Anonymous is a handful of geniuses surrounded by a legion of idiots," :)

I like the use of legion!
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
3/1/2012 | 6:58:37 AM
re: Anonymous Leaves Clues In Failed Vatican Attack
So when is we going to know what happend really ?
dgerke681
50%
50%
dgerke681,
User Rank: Apprentice
2/29/2012 | 7:31:16 PM
re: Anonymous Leaves Clues In Failed Vatican Attack
Anonymous Leaves Clues In Failed Vatican Attack? I don't think this is an accident.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4467
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site.

CVE-2014-4476
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4477
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4479
Published: 2015-01-30
WebKit, as used in Apple iOS before 8.1.3; Apple Safari before 6.2.3, 7.x before 7.1.3, and 8.x before 8.0.3; and Apple TV before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulner...

CVE-2014-4480
Published: 2015-01-30
Directory traversal vulnerability in afc in AppleFileConduit in Apple iOS before 8.1.3 and Apple TV before 7.0.3 allows attackers to access unintended filesystem locations by creating a symlink.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.