Hacker challenge ends in feuding
Tracking Web site crippled by DDOS attack
IDG News Service - A weekend competition to test the skills of malicious hackers fell apart after poor planning by contest organizers and infighting among different hacker groups crippled the Web site responsible for keeping score in the competition.
Contest organizers invited hackers to tamper with up to 6,000 Web sites. Points were awarded to hackers who could successfully compromise an organization's Web server and deface its Web pages, according to Internet Security Systems Inc. (ISS) (see story).
The international contest, known as the Defacers Challenge, was scheduled to begin Sunday. However, Zone-h, the Web site designated by contest organizers to keep score of the defacements, was quickly overwhelmed with traffic Sunday morning, according to a Zone-h statement. The Web site was inaccessible this afternoon.
The Tallinn, Estonia-based security portal, which is the most prominent site that tracks defacements, had no connection to the Defacers Challenge, and site organizers were dismayed to learn that Zone-h was designated as scorekeeper for the challenge, according to Roberto Preatoni, also known as "SyS64738," founder of Zone-h.org.
"Declaring Zone-h referee was the most stupid thing someone could think of," he said.
One of Zone-h's 50 operators personally confirms each recorded defacement. Zone-h could not have verified the flood of 20,000 to 30,000 defacements that were expected within the six-hour window specified by the contest organizers, Preatoni said.
Compounding Zone-h's problems, the site on Sunday fell victim to a massive distributed denial-of-service (DDOS) attack that lasted from 10 a.m till 5 p.m. local time in Estonia, Zone-h said.
The attack, which downed Zone-h's Web site with 900Mbit/sec. of sustained traffic, came from a group of Brazilian hackers unhappy about the contest, Preatoni said.
"They told me that defacing is an art and that silly challenges must be boycotted," he said.
The hackers said that taking down the Zone-h Web site was the only way to thwart the contest organizers, Preatoni said.
The strategy worked. Defaced Web sites submitted to Zone-h for much of Sunday were not received by Zone-h operators and could not be verified, Preatoni said.
Despite the feuding and confusion, Zone-h received around 500 recorded defacements. An additional 400 or 500 were received today, but they had not yet been verified, Preatoni said.
As predicted by Preatoni and others, the list of compromised sites included few household names, but plenty of small Web sites in both the U.S. and abroad, such as www.thebuffrestaurant.com in Boulder, Colo., and www.ddwautomotive.com in Mishakawa, Ind.
The absence of larger sites was greeted with praise by some security companies.
"I think it's evidence that information sharing and awareness about an issue that was coming worked," said
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts