Vulnerabilities / Threats
6/26/2013
11:55 AM
50%
50%

Cybercriminals Expand DDOS Extortion Demands

Free toolkits and outsourced cybercrime services make DDoS attacks popular with Anonymous, criminals, unscrupulous business competitors and anyone with a grudge.

Dear website owner: Pay up or we'll launch a distributed denial-of-service (DDoS) attack against your website.

So goes the extortion threat now being made against multiple websites, including Cryptome, which Wednesday published an "Opsecure DDOS Extortion" letter. Dated Tuesday, the letter said that unless funds were transferred to a designated Bitcoin address, the Cryptome website "will be undergoing a 'distributed denial of service' attack conducted by '1 & 0 Logic Security Group,'" starting Friday. In total, the criminals demanded 1 Bitcoin as payment, which as of Wednesday was equivalent to $102. Instead, Cryptome -- a digital archive that focuses on freedom of speech, cryptography, spying and surveillance -- published the letter, saying it was "honored" to have received it.

As detailed in a recent Economist report, DDoS attacks are increasingly used by criminals to extort businesses, with gangs demanding one or more payoffs if a business wants the disruption of its site to cease.

[ Microsoft offers bug hunters a big payday, but there's a hitch. See Microsoft Dangles $100,000 Bug Bounty. ]

The growth in DDoS attacks, which remain illegal in many countries, including the United States, has been fueled in part by more advanced, and often free, DDoS attack toolkits. With enough malware-infected -- aka zombie -- PCs or servers at their disposal, attackers can overwhelm nearly any unprotected website, sometimes in spectacular fashion. Earlier this year, for example, a DDoS attack against Spamhaus broke records by spewing 300 gigabits per second of bogus data. Spamhaus ultimately mitigated the attack against it -- which used thousands of infected domain name system (DNS) servers -- with the help of DDoS attack mitigation service provider CloudFlare.

Criminal enterprises are behind many of these DDoS disruptions, as demonstrated by a recent attack made using the new "Drive" version of DDoS tool DirtJumper. According to a blog post from Jason Jones, a researcher with the Arbor Networks security engineering and response team, he traced the attack back to a server that also hosted "a BetaBot CnC [command-and-control server] and a Bitcoin mining harvester and all 3 were dropped by a Smoke Loader."

That refers to BetaBot, a relatively new and inexpensive piece of malware that's built to deactivate information security software, and Smoke Loader, which is malware used to load additional malware -- such as crimeware toolkits and remotely controlled DDoS tools -- onto infected systems.

DDoS attack tools, of course, have long been favored by the hacktivist set. In the run-up to the Anonymous-backed attacks against North Korea -- dubbed #OpNorthKorea -- launched Tuesday, for example, the hacktivist collective recommended participants tap one of a number of free DDoS attack tools, such as Slow Loris for Python and Windows, the Low-Orbit Ion Canon, or a set of techniques dubbed as the OWASP Layer 7 DDOS Tool.

Meanwhile, Izz ad-Din al-Qassam Cyber Fighters, which launched the Operation Ababil attacks against U.S. banks last year -- those attacks now appear to be on hiatus -- have favored the "itsoknoproblembro" toolkit, which is also known as Brobot. They've sneaked it onto thousands of legitimate sites, in part by exploiting a known vulnerability in a WordPress plug-in.

In South Korea in October 2011, meanwhile, a DDoS attack was used to disrupt the country's National Election Commission website on the day of a Seoul mayoral by-election. "Information on polling stations was made unavailable during morning hours when a large proportion of young, liberal-leaning constituents were expected to vote en route to work," according to a Freedom House report. Police later arrested a South Korean lawmaker, his personal assistant and the head of an IT services firm for being behind the attack, which authorities said peaked at 263 megabytes per second and was generated using 200 zombie PCs.

For people not well-versed in the art of configuring DDoS attack toolkits or sneaking remote-control DDoS attack code onto otherwise legitimate servers, outsourced services offer to do it for them. Filipino hacker Gwapo, for example, advertises his DDoS attack service on YouTube. Going rates for downing websites are $5 per hour "for small personal websites," and up to $100 per hour "depending on how huge or protected the target is," according to the video. Attacks can be contracted for the short term or long term, and scheduled in advance. Payment is accepted via Bitcoins, as well as CashU Codes, Moneypak and Webmoney. The service even promises refunds if "the target has ... moved to a protected environment which we are not capable of taking down."

"You need your business competitors, rivals, haters or whatever the reason or who they are to go down ... well they can," according to Gwapo's video. "You cannot go wrong."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1774
Published: 2015-04-28
The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.

CVE-2015-1863
Published: 2015-04-28
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.

CVE-2015-3340
Published: 2015-04-28
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.

CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.