Twitter plays key role in DoS attacks in Iran
Social networking tools make it easier to mobilize cyber-attacks
Computerworld - The unrest in Iran is serving as a warning on how easy it is for individuals and groups to use a social networking tool like Twitter to mobilize a cyber-army against a political or commercial target anywhere in the world.
Over the past few days, news media reports have described how Twitter is being used by ordinary Iranians to receive and broadcast real-time information on the political unrest in the country after recent elections.
But a still developing and less benign use of Twitter in Iran has been its application in denial-of-service attacks against key government officials, including those affiliated with President Mahmoud Ahmedinejad.
Initially, the tweets directed users to online locations with links that users could click on to participate in a DoS attack against a particular Iranian Web site, said Richard Stiennon, founder of IT-Harvest, a Birmingham, Mich.-based consultancy.
A Google Doc circulating on the Web, for instance, lists several URLs pointing to Iranian Web sites listed by categories such as "Governmental and HARDLINE NEWS," "Police, Ministry of Interior," "Central Bank," "Commerce Banks" and "Office of Ahmadijenad and Khameneie." When a user clicks on any of the links, it initiates a continuous stream of page refresh requests to the targeted Web site that will eventually overcome the site if enough people click on the link.
More recently, tweets have begun circulating that allows users to achieve the same result by simply clicking on the embedded URL in the message. As soon as a user hits the page, as many as 24 frames open up simultaneously and refresh continuously, causing a DoS attack against the 24 separate Web sites Stiennon said.
"Once you click on what you see in Twitter, you immediately become part of the cyber-army," in Iran, he said.
Another tool that is available via Twitter is called bandwidth raep (bwraep), which is also a sort of DoS attack. This attack works by bombarding a Web server with fake requests to serve up content-heavy images.
Tweets are also circulating that offer information on where to find malware capable of initiating so-called Ping and Syn flood attacks, which are designed to overwhelm servers with an incessant flood of useless requests, Stiennon said.A Cyberwar guide for Iran elections reposted on BoingBoing exhorts would-be cyber warriors to be careful about using Twitter to launch such DoS attacks.
"If you don't know what you are doing, stay out of this game," the guide writes while asking volunteers to only target sites that "legitimate Iranian bloggers" pinpoint. "Be aware that these attacks can have detrimental effects to the network the protesters are relying on. Keep monitoring their traffic to note when you should turn the taps on or off."
- Six Ways Your Small Business Can Save with Internet Phone Service Traditional phone systems present two main problems for businesses: limited features and high costs. As a result, small businesses are migrating to Internet...
- Face Time Anytime Real-time communications facilitates team collaboration from nearly anywhere in the world. With facts and figures you can use to justify an investment
- Now is the time to implement a video conference solution Video conferencing is getting a lot of buzz lately due to the recent cost decrease, making it tangible for many law firms. It's...
- Video drives engagement Achieving maximum results means building a solid platform and network infrastructure. As digital age unfolds, it's clear that the ability to communicate effectively...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Web Apps White Papers | Webcasts