Hacker challenge ends in feuding
Tracking Web site crippled by DDOS attack
IDG News Service - A weekend competition to test the skills of malicious hackers fell apart after poor planning by contest organizers and infighting among different hacker groups crippled the Web site responsible for keeping score in the competition.
Contest organizers invited hackers to tamper with up to 6,000 Web sites. Points were awarded to hackers who could successfully compromise an organization's Web server and deface its Web pages, according to Internet Security Systems Inc. (ISS) (see story).
The international contest, known as the Defacers Challenge, was scheduled to begin Sunday. However, Zone-h, the Web site designated by contest organizers to keep score of the defacements, was quickly overwhelmed with traffic Sunday morning, according to a Zone-h statement. The Web site was inaccessible this afternoon.
The Tallinn, Estonia-based security portal, which is the most prominent site that tracks defacements, had no connection to the Defacers Challenge, and site organizers were dismayed to learn that Zone-h was designated as scorekeeper for the challenge, according to Roberto Preatoni, also known as "SyS64738," founder of Zone-h.org.
"Declaring Zone-h referee was the most stupid thing someone could think of," he said.
One of Zone-h's 50 operators personally confirms each recorded defacement. Zone-h could not have verified the flood of 20,000 to 30,000 defacements that were expected within the six-hour window specified by the contest organizers, Preatoni said.
Compounding Zone-h's problems, the site on Sunday fell victim to a massive distributed denial-of-service (DDOS) attack that lasted from 10 a.m till 5 p.m. local time in Estonia, Zone-h said.
The attack, which downed Zone-h's Web site with 900Mbit/sec. of sustained traffic, came from a group of Brazilian hackers unhappy about the contest, Preatoni said.
"They told me that defacing is an art and that silly challenges must be boycotted," he said.
The hackers said that taking down the Zone-h Web site was the only way to thwart the contest organizers, Preatoni said.
The strategy worked. Defaced Web sites submitted to Zone-h for much of Sunday were not received by Zone-h operators and could not be verified, Preatoni said.
Despite the feuding and confusion, Zone-h received around 500 recorded defacements. An additional 400 or 500 were received today, but they had not yet been verified, Preatoni said.
As predicted by Preatoni and others, the list of compromised sites included few household names, but plenty of small Web sites in both the U.S. and abroad, such as www.thebuffrestaurant.com in Boulder, Colo., and www.ddwautomotive.com in Mishakawa, Ind.
The absence of larger sites was greeted with praise by some security companies.
"I think it's evidence that information sharing and awareness about an issue that was coming worked," said
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!