Attacks/Breaches
12/10/2010
12:49 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

WikiLeaks Supporters Download Botnet Toolkit 50,000 Times

Security experts warn those considering joining the pro-WikiLeaks army that it's very easy to trace those who participate in the illegal denial of service attacks.

As part of Operation Payback, volunteers have stepping forward to help target anti-WikiLeaks organizations with distributed denial of service (DDoS) attacks run via botnet. One related toolkit has already been downloaded 50,000 times.

Typically, botnets employ surreptitiously compromised PCs to launch attacks aimed at stealing people's personal financial information. But in this case, botnets are being used to trigger the PCs of volunteers into flooding designated sites with packets, en masse. While Amazon.com has repulsed related DDoS attacks against it, the Web sites of MasterCard and the Swedish Prosecutor's Service have suffered outages.

The attack code, known as Low Orbit Ion Cannon, comes in three flavors: manual, server-controlled, and a JavaScript version -- known as JavaLoic -- that requires no download. According to Vanja Svajcer, principal virus researcher at SophosLabs, the application includes a "Hive Mind" feature that connects to an IRC channel for coordinating the attack. Interestingly, the application itself is open source, was written in C#, and is hosted on major open source code repositories, including Sourceforge.

"The main purpose of the tool, allegedly, is to conduct stress tests of the Web applications, so that the developers can see how a Web application behaves under a heavier load," said Svajcer. "Of course, a stress application, which could be classified as a legitimate tool, can also be used in a DDoS attack."

Numerous people have downloaded -- and are apparently using -- the software. By Thursday, "for the server-controlled version, there have been already 33,000 downloads at a rate of more than 1,000 downloads per hour," said Rob Rachwald, director of security strategy at Imperva. By Friday, the manual version of the malware had been downloaded 50,000 times.

Thinking of enlisting? "Stay well away," said Graham Cluley, senior technology consultant at Sophos. He said that laws in the United Kingdom punish such attacks with up to 10 years in prison, while Sweden and the United States have similar laws on the books.

To that list, add the Netherlands. On Thursday, Dutch police officers arrested a teenager in The Hague. They said he admitted to participating in pro-WikiLeaks attacks against the MasterCard and Visa Web sites.

As that suggests, attacks can be traced back. "Many people believe that privacy on the Internet can be somewhat protected, but beware, the source IP addresses of attackers, which will inevitably end up in the target's Web site log files, can easily be matched with user's accounts if ISPs decide to cooperate with the law enforcement agencies," said SophosLabs' Svajcer.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6212
Published: 2014-04-19
Unspecified vulnerability in HP Database and Middleware Automation 10.0, 10.01, 10.10, and 10.20 before 10.20.100 allows remote authenticated users to obtain sensitive information via unknown vectors.

CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2013-6215
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 10.01 and 10.10 allows remote authenticated users to execute arbitrary code via unknown vectors, aka ZDI-CAN-1977.

CVE-2013-6218
Published: 2014-04-19
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x, 9.1x, and 9.2x allows remote attackers to execute arbitrary code via unknown vectors.

Best of the Web