Attacks/Breaches
3/6/2013
12:17 PM
Connect Directly
RSS
E-Mail
50%
50%

Bank Attackers Restart Operation Ababil DDoS Disruptions

Some customers report difficulty accessing banking sites, but officials said DDoS defenses and service provider blocks may be partly to blame.

The hacktivist Muslim bank website takedown crew is back.

The Izz ad-Din al-Qassam Cyber Fighters Tuesday announced via Pastebin that they would resume their Operation Ababil distributed denial of service (DDoS) attacks this week against U.S. financial institutions.

"During ... Operation Ababil Phase 3, like previous phases, a number of american banks will be hit by denial of service attacks three days a week, on Tuesday, Wednesday and Thursday during working hours," read the group's latest statement.

The al-Qassam Cyber Fighters last week issued an "Al-Qassam ultimatum", warning that unless all copies of the "Innocence of Muslims" movie that mocks the founder of Islam are removed from the Internet, it would commence a third round of bank DDoS attacks. "To warn and to show our seriousness for this, an attack string was carried out against some U.S. banks on Monday February 25, 2013 such as Bank of America, PNC, CapitalOne, Zions bank, 5/3, Unionbank, Comerica, Citizenbank, Peoples, UFCU, Patelco, and others," it said.

[ Anonymous targets Wall Street. Read Anonymous Launches Operation Wall Street, Targets CEOs. ]

This week, the group appeared to carry through with those threats. According to the Site Down website, beginning Tuesday, customers of Bank of America, Capital One, Citibank, PNC Bank, Union Bank and Wells Fargo began reporting an increased number of website disruptions.

One commenter on Site Down posted Tuesday morning, "Can not access bankofamerica.com. Web site will not load...however...I CAN connect and log in using my iPhone. Strange." Another post read: "Site STILL down. Can we get a response??? am ready to take my banking elsewhere; this is getting ridiculous." Similar bursts of customer frustration were likewise directed at the other supposedly disrupted websites.

But have the banks' sites really been disrupted? BoA spokesman Mark T. Pipitone suggested otherwise. "At this point, we've had no issues on our end," he said via email.

Another bank official, speaking on background by phone, said that while many financial services websites are being targeted with DDoS attacks, people's inability to reach the websites is likely a side effect of the DDoS attack-scrubbing services and technology that firms now have in place, as well as service providers' own defenses. In other words, when a person can't access a banking site, it may be because their network, IP address or machine is being blocked by DDoS mitigation tools.

Furthermore, with a bank such as BoA alone counting 57 million customers, it can be difficult to tell whether the number of people who haven't been able to access a particular website on a given day has altered in a statistically significant way. Looking at BoA, over the past month the Site Down website received about 13 reports per day that the site couldn't be accessed. That number increased to an average of 18 per day this week, and 52 in the past 24 hours.

Of course, the combination of DDoS attacks and DDoS defenses does seem to be keeping some customers from accessing banking websites, even though the actual sites may still be up. That speaks to the scale of the website attacks -- and thus defenses in place against them. The attacks combine multiple attack techniques with massive scale, which has included maintaining sustained packet floods peaking at 70 Gbps and 30 million packets per second.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7052
Published: 2014-10-19
The sahab-alkher.com (aka com.tapatalk.sahabalkhercomvb) application 2.4.9.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7056
Published: 2014-10-19
The Yeast Infection (aka com.wyeastinfectionapp) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7070
Published: 2014-10-19
The Air War Hero (aka com.dev.airwar) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7075
Published: 2014-10-19
The HAPPY (aka com.tw.knowhowdesign.sinfonghuei) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7079
Published: 2014-10-19
The Romeo and Juliet (aka jp.co.cybird.appli.android.rjs) application 1.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.