Making Home Routers Easier To Use In Future DDoS Attacks

By Robert Vamosi | 4/3/13 1:19 PM

One of the limiting factors in large-scale Internet attacks like the one last week is the time it takes to scan the Internet. But new research suggests there are easier methods, and this bodes poorly for the future.

Read More >

Largest DDoS Attack (So Far) Included ... Cable Boxes?

By Robert Vamosi | 4/1/13 10:51 PM

Apparently the Internet of Things played a role in the recent distributed denial of service (DDoS) attack on the antispam organization Spamhaus last week.

Read More >

Two-Day Long DDoS Attack Breaches U.S. Utility

By Robert Vamosi | 3/15/13 8:00 AM

A US utility's website was taken offline in February by a two-day long distributed denial of service (DDoS) attack, according to security vendor Prolexic.

BankInfoSecurity reports there were no direct connections between the utility attack and those on financial institutions over the last six months but suggested that criminal hackers were broadening their attacks to include other aspects of the US infrastructure.

Read More >

US Banks Once Again Face Cyber Attacks

By Robert Vamosi | 12/17/12 2:47 AM

Last September, twenty-six US banks were identified as targets of a massive distributed denial of service-based (DDoS-based) cyber attack. The threat remains, say Izz ad-Din al-Qassam Cyber Fighters, the criminal hackers responsible for the first wave.

Read More >

Banks Warned Of "Credible" Cyber Threat

By Robert Vamosi | 9/20/12 3:59 AM

Financial Services Information Sharing and Analysis Center (FS-ISAC) has warned US Banks of a potential cyber threat after outages affected Chase and Bank of America earlier this week.

Read More >

Black Hat Founder Favors Interenet Litigation Vs Retaliation

By Robert Vamosi | 7/26/12 12:07 AM

Black Hat founder Jeff Moss, in his opening remarks at the 15th Annual Black Hat Briefings in Las Vegas, attacking your attackers in court is a better way.

Read More >

Critical Infrastructure Under Persistent Attack

By JDavis | 2/9/10 7:51 AM

A recent report by the Center for Strategic and International Studies (CSIS) details the alarming results of a survey of 600 IT security executives worldwide, working in utilities, oil refineries and banking.

Read More >

Cell DDoS Attacks Imminent

By JDavis | 11/22/09 3:48 PM

Driven by immensely successful devices such as the BlackBerry, the iPhone, and the Droid, the consumer smartphone ecosystem is growing at an incredible pace. However, most end users give little consideration to the security of these mobile devices – and unfortunately, most smartphone manufacturers and service providers haven’t worked too hard on security issues, either. This enormous population of comparatively “soft targets” will almost certainly suffer debilitating Denial-of-Service attacks in the coming year.

As reported in a recent Computerworld article, Research in Motion's (RIM) VP of BlackBerry Security, Scott Totzke, believes that "compromised or 'rogue' smartphones could be used in the future to target and bring down wireless carrier's cellular networks via distributed-denial-of-service (DDoS) attacks." Totzke cautioned that such attacks would also be carried out by targeting smartphone users and using their devices to bombard, and ultimately crash, carrier networks. Virus-infected mobile applications are also possible sources for this kind of DDoS attack since consumers are much less “trained” to avoid possible malware on their mobile devices than they are on their PCs.

Read More >

Malware hijacks 100,000 home routers into Botnet

By JDavis | 4/5/09 5:58 PM

Unbeknown to most end users, a new sophisticated piece of malware corrals consumer routers and DSL modems into a lethal botnet. Using a variety of strategies for exploitation, this could be an attack vector for the theft of personally identifying information – a technique that’s not going away, according to researchers at DroneBL.

The "psyb0t" worm is believed to be the first piece of malware to target home networking gear, which bills itself as a real-time monitor of abusable internet addresses. It has already infiltrated an estimated 100,000 hosts. It has been used to carry out DDoS, or distributed denial of service, attacks and is also believed to use deep-packet inspection to harvest user names and passwords.

More here.

Read More >