01:40 PM

Bank Hacks: Iran Blame Game Intensifies

Wells Fargo official says scale of the attacks was "pretty significant." Is this the face of "cyberwar"?

Who's behind the continuing series of attacks against the websites of numerous U.S. banks? A flurry of news reports Friday pointed the finger squarely at Iran.

"They have been going after everyone--financial services, Wall Street," a senior defense official, speaking anonymously, told The Wall Street Journal. "Is there a cyberwar going on? It depends on how you define war."

Earlier this month, the distributed denial-of-service (DDoS) attacks used by the banking website attackers successfully disrupted the operations of leading Wall Street financial institutions, including Bank of America, JPMorgan Chase, and Wells Fargo, as well as other firms. Last week, the attacks expanded to include Capital One, SunTrust, and Regions Financial.

Despite an advance warning by attackers, all of the targeted banks' websites still suffered disruptions. As that suggests, and as Wells Fargo CFO Tim Sloan confirmed to Reuters Friday, the scale of the DDoS attack launched against his bank was "pretty significant," although he noted--as have other officials at banks whose websites were disrupted--that no customer data had been compromised by attackers.

[ For more on the recent spate of U.S. bank attacks, see U.S. Bank Hacks Expand, Regions Financial Hit. ]

"I don't want to minimize the potential damage it could cause to the industry," said Sloan. "But in terms of how the industry performed and how Wells Fargo performed in reaction to the recent efforts, we actually performed very well." Some customers, however, have criticized the affected banks for not restoring their websites in a timely manner.

A self-described hacktivist group, the Cyber fighters of Izz ad-din Al qassam, has taken credit for the attacks, and has also released statements denying that it's behind wire-transfer attacks that have been launched against U.S. banks over the past year. The group said the DDoS attacks are meant to protest the release of a clip from the "Innocence of Muslims" film that mocks the founder of Islam.

But information security experts have been finding inaccuracies in the Cyber fighters of Izz ad-din Al Qassam's statements, as well as evidence that the group is better organized than it has stated. Meanwhile, U.S. government officials have been stepping up their public accusations that the Iranian government has been directly sponsoring the attacks.

Likewise, Sen. Joseph I. Lieberman (I-Conn.), who chairs the Homeland Security and Governmental Affairs Committee, has blamed Iran for the attacks. "I think this was done by Iran and the Quds Force, which has its own developing cyber attack capability," Lieberman recently told C-SPAN, reported The Washington Post. The Quds Force is a special unit of the Revolutionary Guard, which is a branch of Iran's military.

But speaking anonymously, U.S. officials recently said that they've traced the attacks to a group of fewer than 100 Iranian information security specialists--based at Iranian universities and technology companies--who they say have been the actual hackers behind the bank attacks. The officials said that the evidence that conclusively links the Iranians to the attacks is classified, but said the scale and effectiveness of the DDoS attacks reinforced that the hackers had substantial backing. "These are not ordinary Iranians," a senior U.S. official told The Wall Street Journal.

Iranian officials have denied hacking any U.S. banks. But earlier this year, Iranian government officials announced the creation of a military "cyber corps" to help the country better defend itself against online attacks such as Stuxnet.

In February 2012, at an Iranian conference devoted to addressing perceived online threats against the country, Brig. Gen. Gholam-Reza Jalali, who heads the Passive Defense Organization of Iran (PDOI), reportedly told attendees that "Iran has begun to operate its first cyber army." Likewise, in an interview earlier this year, according to news reports, Jalali said that Iran had created a "cyber command," noting that creating "the cyber defense strategy is now on our agenda."

"The important point is that we develop mechanisms for cyber defense in a way that we will be able to defend the country against new viruses," he said.

The U.S. government hasn't directly taken credit for creating Stuxnet, Flame, or other espionage malware that was used against Iranian systems. But according to David Sanger's book Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, published earlier this year, White House officials--speaking off the record--said that the malware had been developed as part of a classified program code-named "Olympic Games."

Organizations challenged by meeting the requirements of multiple regulatory mandates are increasingly looking at the alignment of governance, risk, and compliance under a unified framework, GRC.In our report, A Security Pro's Guide To GRC, we examine where the security professionals figure into the mix and recommend the steps organizations should take to align IT GRC with existing security programs and processes. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-08-29
Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token...

Published: 2015-08-29
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point i...

Published: 2015-08-28
Buffer overflow in CHICKEN 4.9.0.x before, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."

Published: 2015-08-28
Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file.

Published: 2015-08-28
Type74 ED before 4.0 misuses 128-bit ECB encryption for small files, which makes it easier for attackers to obtain plaintext data via differential cryptanalysis of a file with an original length smaller than 128 bits.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.