Attacks/Breaches
10/15/2012
01:40 PM
50%
50%

Bank Hacks: Iran Blame Game Intensifies

Wells Fargo official says scale of the attacks was "pretty significant." Is this the face of "cyberwar"?

Who's behind the continuing series of attacks against the websites of numerous U.S. banks? A flurry of news reports Friday pointed the finger squarely at Iran.

"They have been going after everyone--financial services, Wall Street," a senior defense official, speaking anonymously, told The Wall Street Journal. "Is there a cyberwar going on? It depends on how you define war."

Earlier this month, the distributed denial-of-service (DDoS) attacks used by the banking website attackers successfully disrupted the operations of leading Wall Street financial institutions, including Bank of America, JPMorgan Chase, and Wells Fargo, as well as other firms. Last week, the attacks expanded to include Capital One, SunTrust, and Regions Financial.

Despite an advance warning by attackers, all of the targeted banks' websites still suffered disruptions. As that suggests, and as Wells Fargo CFO Tim Sloan confirmed to Reuters Friday, the scale of the DDoS attack launched against his bank was "pretty significant," although he noted--as have other officials at banks whose websites were disrupted--that no customer data had been compromised by attackers.

[ For more on the recent spate of U.S. bank attacks, see U.S. Bank Hacks Expand, Regions Financial Hit. ]

"I don't want to minimize the potential damage it could cause to the industry," said Sloan. "But in terms of how the industry performed and how Wells Fargo performed in reaction to the recent efforts, we actually performed very well." Some customers, however, have criticized the affected banks for not restoring their websites in a timely manner.

A self-described hacktivist group, the Cyber fighters of Izz ad-din Al qassam, has taken credit for the attacks, and has also released statements denying that it's behind wire-transfer attacks that have been launched against U.S. banks over the past year. The group said the DDoS attacks are meant to protest the release of a clip from the "Innocence of Muslims" film that mocks the founder of Islam.

But information security experts have been finding inaccuracies in the Cyber fighters of Izz ad-din Al Qassam's statements, as well as evidence that the group is better organized than it has stated. Meanwhile, U.S. government officials have been stepping up their public accusations that the Iranian government has been directly sponsoring the attacks.

Likewise, Sen. Joseph I. Lieberman (I-Conn.), who chairs the Homeland Security and Governmental Affairs Committee, has blamed Iran for the attacks. "I think this was done by Iran and the Quds Force, which has its own developing cyber attack capability," Lieberman recently told C-SPAN, reported The Washington Post. The Quds Force is a special unit of the Revolutionary Guard, which is a branch of Iran's military.

But speaking anonymously, U.S. officials recently said that they've traced the attacks to a group of fewer than 100 Iranian information security specialists--based at Iranian universities and technology companies--who they say have been the actual hackers behind the bank attacks. The officials said that the evidence that conclusively links the Iranians to the attacks is classified, but said the scale and effectiveness of the DDoS attacks reinforced that the hackers had substantial backing. "These are not ordinary Iranians," a senior U.S. official told The Wall Street Journal.

Iranian officials have denied hacking any U.S. banks. But earlier this year, Iranian government officials announced the creation of a military "cyber corps" to help the country better defend itself against online attacks such as Stuxnet.

In February 2012, at an Iranian conference devoted to addressing perceived online threats against the country, Brig. Gen. Gholam-Reza Jalali, who heads the Passive Defense Organization of Iran (PDOI), reportedly told attendees that "Iran has begun to operate its first cyber army." Likewise, in an interview earlier this year, according to news reports, Jalali said that Iran had created a "cyber command," noting that creating "the cyber defense strategy is now on our agenda."

"The important point is that we develop mechanisms for cyber defense in a way that we will be able to defend the country against new viruses," he said.

The U.S. government hasn't directly taken credit for creating Stuxnet, Flame, or other espionage malware that was used against Iranian systems. But according to David Sanger's book Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, published earlier this year, White House officials--speaking off the record--said that the malware had been developed as part of a classified program code-named "Olympic Games."

Organizations challenged by meeting the requirements of multiple regulatory mandates are increasingly looking at the alignment of governance, risk, and compliance under a unified framework, GRC.In our report, A Security Pro's Guide To GRC, we examine where the security professionals figure into the mix and recommend the steps organizations should take to align IT GRC with existing security programs and processes. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.