Attacks/Breaches
12/10/2010
12:49 PM
50%
50%

WikiLeaks Supporters Download Botnet Toolkit 50,000 Times

Security experts warn those considering joining the pro-WikiLeaks army that it's very easy to trace those who participate in the illegal denial of service attacks.

As part of Operation Payback, volunteers have stepping forward to help target anti-WikiLeaks organizations with distributed denial of service (DDoS) attacks run via botnet. One related toolkit has already been downloaded 50,000 times.

Typically, botnets employ surreptitiously compromised PCs to launch attacks aimed at stealing people's personal financial information. But in this case, botnets are being used to trigger the PCs of volunteers into flooding designated sites with packets, en masse. While Amazon.com has repulsed related DDoS attacks against it, the Web sites of MasterCard and the Swedish Prosecutor's Service have suffered outages.

The attack code, known as Low Orbit Ion Cannon, comes in three flavors: manual, server-controlled, and a JavaScript version -- known as JavaLoic -- that requires no download. According to Vanja Svajcer, principal virus researcher at SophosLabs, the application includes a "Hive Mind" feature that connects to an IRC channel for coordinating the attack. Interestingly, the application itself is open source, was written in C#, and is hosted on major open source code repositories, including Sourceforge.

"The main purpose of the tool, allegedly, is to conduct stress tests of the Web applications, so that the developers can see how a Web application behaves under a heavier load," said Svajcer. "Of course, a stress application, which could be classified as a legitimate tool, can also be used in a DDoS attack."

Numerous people have downloaded -- and are apparently using -- the software. By Thursday, "for the server-controlled version, there have been already 33,000 downloads at a rate of more than 1,000 downloads per hour," said Rob Rachwald, director of security strategy at Imperva. By Friday, the manual version of the malware had been downloaded 50,000 times.

Thinking of enlisting? "Stay well away," said Graham Cluley, senior technology consultant at Sophos. He said that laws in the United Kingdom punish such attacks with up to 10 years in prison, while Sweden and the United States have similar laws on the books.

To that list, add the Netherlands. On Thursday, Dutch police officers arrested a teenager in The Hague. They said he admitted to participating in pro-WikiLeaks attacks against the MasterCard and Visa Web sites.

As that suggests, attacks can be traced back. "Many people believe that privacy on the Internet can be somewhat protected, but beware, the source IP addresses of attackers, which will inevitably end up in the target's Web site log files, can easily be matched with user's accounts if ISPs decide to cooperate with the law enforcement agencies," said SophosLabs' Svajcer.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.