09:19 AM

Anonymous Leaves Clues In Failed Vatican Attack

Researchers at RSA detail a rare glimpse into the specific strategies, tools, and tactics used by Anonymous to infiltrate or take down websites.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
How do hacktivists launch attacks? A new report details an online assault launched in August by the hacktivist collective Anonymous that lasted for 25 days, and which was designed to disrupt a specific event.

The research, released Sunday by data security vendor Imperva on the eve of this week's RSA conference in San Francisco, offers a rare glimpse into the specific strategies, tools, and tactics used by Anonymous in its attempts to infiltrate or take down websites.

While officials at Imperva declined to identify the attacked organization, according to news reports, the attack was launched against a Vatican website. The Vatican likewise declined to confirm the attack, but according to news reports, a church official accidentally sent an email--intended for a colleague--to a journalist that read, "I do not think it is convenient to respond to journalists on real or potential attacks," and that "the more we are silent in this area the better."

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The Anonymous attack was launched under the banner of Operation Pharisee, which began with attacks in South America and Mexico. This particular attack, however, was designed to disrupt a planned visit by Pope Benedict XVI to Madrid as part of World Youth Day 2011. But the attempt to scuttle the Vatican's related website failed, despite the launch of a distributed-denial-of-service (DDoS) attack that saw traffic volumes spike to 34 times their normal level.

Researchers at Imperva had advance warning of the attack, meaning they were able to watch it closely as it unfolded. "The thing that distinguishes hacktivism from financially motivated attackers is that they're loud and they preannounce," said Amichai Shulman, CTO of Imperva, in a meeting at the RSA conference.

Here's how the attack proceeded: During the first phase, Anonymous conducted reconnaissance of the Vatican website, looking for any Web application vulnerabilities they could exploit to access servers and steal data. Attackers used a number of freely available tools, including an Iranian-built automated SQL injection scanner named Havij (literally "carrot" in Farsi, though it's also a common slang term for male genitalia), as well as Acunetix Scanner and Nikto Scanner, which search servers for signs of known vulnerabilities, including SQL injection and cross-site scripting bugs, as well as outdated server software.

Based on those tools requiring their operators to understand the intricacies of Web applications and related vulnerabilities, "the first part was carried out by a small group of professionals," said Shulman.

But the tools were failing to turn up any weaknesses in the Vatican website that attackers could exploit. Accordingly, the attack organizers began a recruitment campaign via Facebook, Twitter, and YouTube, calling on people to join Anonymous in bringing down the World Youth Day website by using the Low Orbit Ion Cannon (LOIC) DDoS tool. Anonymous also made use of a then-new mobile version of LOIC, which was a Web page with JavaScript that would execute a DDoS attack after the page was visited by a mobile device browser.

As noted, the attack lasted 25 days, but interestingly, most of that time was spent conducting reconnaissance or recruiting DDoS participants. "Days 19 to 25 were the actual attack phase, split between application attacks and then DDoS attacks," said Rob Rachwald, director of security strategy at Imperva, in a meeting at the RSA conference.

Shulman said one of the most interesting findings from Imperva's analysis of the attack was the insight into how Anonymous conducts reconnaissance, especially since the topic "is not usually discussed" by Anonymous members, at least in public forums. What was also notable was that the group only launched a DDoS attack after failing to find known Web application vulnerabilities to exploit. That, in turn, suggests that many Anonymous DDoS attacks are only launched after--and in cases when--the group fails to find known application weaknesses to exploit. "Our research ... shows that Anonymous will try to steal data first and, if that fails, attempt a DDoS attack," he said.

Another finding was that while an open call was made for people to join the Anonymous DDoS attack, the initial reconnaissance phase was conducted by a relatively small number of "sophisticated hackers," according to the Imperva report. That, in turn, squares with some analyses of Anonymous, which suggest that the core group is composed of a relatively small number of people.

"Anonymous is a handful of geniuses surrounded by a legion of idiots," Cole Stryker, an expert on the anything-goes 4chan message boards who's researched Anonymous, told the New York Times. "You have four or five guys who really know what they're doing and are able to pull off some of the more serious hacks, and then thousands of people spreading the word, or turning their computers over to participate in a DDoS attack."

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/2/2012 | 2:17:26 PM
re: Anonymous Leaves Clues In Failed Vatican Attack
As with any organization: "Anonymous is a handful of geniuses surrounded by a legion of idiots," :)

I like the use of legion!
User Rank: Apprentice
3/1/2012 | 6:58:37 AM
re: Anonymous Leaves Clues In Failed Vatican Attack
So when is we going to know what happend really ?
User Rank: Apprentice
2/29/2012 | 7:31:16 PM
re: Anonymous Leaves Clues In Failed Vatican Attack
Anonymous Leaves Clues In Failed Vatican Attack? I don't think this is an accident.
Register for Dark Reading Newsletters
White Papers
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.