Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Muslim Hacktivists Take Credit For U.S. Bank Attack

A hacktivist group is apparently following through on its vow to attack financial institutions in retaliation for anti-Muslim film.

Muslim hacktivists are apparently following through on their promise to disrupt a number of financial services websites, with U.S. Bank being the most recent target.

A spokeswoman for U.S. Bancorp, which operates U.S. Bank, confirmed that its site had been attacked Wednesday. "The attacks yesterday caused intermittent delays for some consumers visiting our website, but neither our website nor our mobile application were offline at any time. In addition, we can assure customers that their data and funds are secure," she said.

She also emphasized that while website access was intermittent, no customer data or funds had been compromised. "These issues are related to unusual and coordinated high traffic volume designed to slow down the system--similar to what other banks have experienced in the past week. We are working closely with federal law enforcement officials to address the issue," she said.

Security researcher Atif Mushtaq at FireEye, told PC Advisor that the U.S. Bank website had been subjected to a distributed denial-of-service (DDoS) attack involving hundreds of thousands of computers.

The attack against U.S. Bank follows an apparent, similar attack Tuesday against Wells Fargo, which likewise apologized via Twitter to its customers. "We apologize to customers who may be experiencing limited access to @wellsfargo.com & online banking. We are working to quickly ... resolve this issue. Customers can still access their accounts through our ATMs, stores, and by phone," it said.

[ Could an international agreement forestall U.S. cyber warfare with other countries? The Case For A Cyber Arms Treaty. ]

By Thursday, Wells Fargo appeared to have resolved any website disruption issues. "Customers can access their accounts through the online and mobile channels. We appreciate our customers’ patience and apologize for any inconvenience," said spokeswoman Sara Hawkins via email. But she declined to answer questions about whether the bank had ascribed the slowdown to an external attack, and if so, where the attack traffic originated.

But a hacktivist group calling itself the "Cyber fighters of Izz ad-din Al qassam" announced Tuesday via a now-deleted Pastebin post that it would be attacking the two websites, as part of its ongoing "Operation Ababil," which began last week with attacks against both the Bank of America and JPMorgan Chase websites, both of which experienced periodic outages. According to the hacktivist group, the attacks are in retaliation for the release of the Innocence of Muslims film that mocks the founder of Islam, and which has triggered numerous riots across the Middle East.

In the group's Tuesday Pastebin, it promised to "attack for 8 hours daily, starting at 2:30 PM GMT," the Wells Fargo website Tuesday, the U.S. Bank website Wednesday, and the PNC Financial Services group website Thursday, and suggested that customers attempt to perform any required website banking outside those hours. The hacktivist group also threatened that "if America's arrogant government do not submit"--it didn't define what that means--it will extend its attacks to "other evil countries" such as Israel, France, and the United Kingdom.

While the Cyber fighters of Izz ad-din Al qassam group has taken credit for the recent attacks against banks, former U.S. government officials, speaking anonymously, have blamed the Iranian government for the attacks, saying that similar DDoS attacks have been against U.S. financial institutions' websites for the past year by Iran. Likewise, Sen. Joseph I. Lieberman (I-Conn.), who chairs the Homeland Security and Governmental Affairs Committee, has also blamed Iran for the most recent attacks, though as yet offered no evidence to substantiate that claim.

In response to that criticism, a senior Iranian official this week strongly denied that his government had anything to do with the recent banking website attacks, or any attacks against U.S. financial institutions, and instead suggested that the allegations were meant to provide justification for the United States having launched its own online attacks against Iran.

Iranian government backing or no, the Cyber fighters of Izz ad-din Al qassam apparently isn't the only organization that's taken to targeting websites in retaliation for Innocence of Muslims. The Pakistan Cyber Army also said that it's begun an online protest campaign, with member Sizzling Soul announcing Sunday via Pastebin that he'd defaced over 80 websites to date. While the list includes numerous small businesses, Sizzling Soul also claims to have defaced websites run by the U.S. Department of Agriculture, Bank of America, and New York Stock Exchange, as well as websites for Angry Birds and Persia Bank in London. As of late Thursday morning, the Persia Bank website remained defaced with Pakistan Cyber Army and Sizzling Soul graphics, as well as a reprint of a Pastebin post from Sizzling Soul that reads in part: "You Are Provoking The Anger Of PeaceFull Muslims! / Stop This / Otherwise You WOn't Be Able To Stop Us."

On a similar note, hacktivist Rude Thunder Saturday claimed via Pastebin to have hacked 104 websites, including a British home and garden website, as well as numerous betting and poker-related sites, "to share our message." As the choice of targets, per the hacktivist norm, reads like a random list of websites, rather than a concentrated attack against financial services companies--as in the case of the Cyber fighters of Izz ad-din Al qassam--it suggests that the Pakistan Cyber Army and Rude Thunder are likely using automated vulnerability testing tools to search for, and exploit, any website servers running software with known vulnerabilities.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
9/28/2012 | 1:15:43 PM
re: Muslim Hacktivists Take Credit For U.S. Bank Attack
It matters little what the country of origin is for a bad actor. Surely you don't think that the LA creator of the anti-muslim video speaks for the entire US (or that we all support him) do you?

It's true that the 911 criminals were mainly Saudi. However, they were living and training in Afghanistan under the protection of the Taliban... an equally despicable bunch. I think it was the right call to take that group out.

Iraq, on the other hand, was the culmination of both a personal vendetta ala the Bush family as well as Cheney and his cronies milking billions for their military industrial complex connections.That one definitely meets your ridiculous stupidity test.
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
9/28/2012 | 12:00:25 PM
re: Muslim Hacktivists Take Credit For U.S. Bank Attack
The 9/11 attackers where mainly from Saudi-Arabia and Egypt. Also, most of the funding came from Saudi-Arabia, but the US government at that time decided to bomb Iraq and Afghanistan back into the stone age. There is a lot of ridiculous stupidity on all sides.
Bob Gill
50%
50%
Bob Gill,
User Rank: Apprentice
9/27/2012 | 7:37:47 PM
re: Muslim Hacktivists Take Credit For U.S. Bank Attack
I admit I don't get it. I was born in the USA and I'm not Muslim.

By the hackers way of thinking, can I fire bomb some buildings in Pakistan. I'm justified because some Pakistani attacked a bank in the USA - even though the Pakistani building occupants had nothing to do with this.

If some guy says a bad word about Islam, why is it that Imans think the entire country where that guy lives should be destroyed? Strangely, the USA guy is from Egypt so why aren't they destroying Egypt?
Tom P
50%
50%
Tom P,
User Rank: Apprentice
9/27/2012 | 5:39:05 PM
re: Muslim Hacktivists Take Credit For U.S. Bank Attack
They're hitting PNC bank today (9/27).
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14174
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view titles of a private project via an Insecure Direct Object References (IDOR) vulnerability in the Administration Permission Helper. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5....
CVE-2019-20901
PUBLISHED: 2020-07-13
The login.jsp resource in Jira before version 8.5.2, and from version 8.6.0 before version 8.6.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect in the os_destination parameter.
CVE-2019-20898
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.
CVE-2019-20899
PUBLISHED: 2020-07-13
The Gadget API in Atlassian Jira Server and Data Center in affected versions allows remote attackers to make Jira unresponsive via repeated requests to a certain endpoint in the Gadget API. The affected versions are before version 8.5.4, and from version 8.6.0 before 8.6.1.
CVE-2019-20900
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module. The affected versions are before version 8.7.0.