U.K., not North Korea, source of DDOS attacks, researcher says
Security analysts had been skeptical of the claims about North Korea
IDG News Service - The U.K. was the likely source of a series of attacks last week that took down popular Web sites in the U.S. and South Korea, according to an analysis performed by a Vietnamese computer security analyst.
The results contradict assertions made by some in the U.S. and South Korean governments that North Korea was behind the attack. Security analysts had been skeptical of the claims, which were reportedly made in off-the-record briefings and for which proof was never delivered.
The week-long distributed denial of service attack involved sending multiple requests to a handful of Web sites from tens of thousands of computers so the sites became overloaded. Among the sites taken offline at some time during the week were those of the U.S. Departments of Transportation and Treasury, the U.S. Federal Trade Commission, the South Korea's president's home page, the South Korean national assembly and U.S. Forces Korea.
The computers used to send the flood of requests had been infected with a virus that allowed attackers to use them anonymously.
Every three minutes the infected computers randomly selected one of eight servers to connect to and receive orders, said Nguyen Minh Duc, senior security director at Bach Khoa Internetwork Security (Bkis), in a blog posting on the company's Web site. Bkis says it gained control of two of the eight servers and through this has been able to discover the master server.
That server has an IP address in the 195.90.118.x range, Nguyen said.
The address is registered to Global Digital Broadcast in the U.K. The company could not immediately be contacted.
"Having located the attacking source in U.K., we believed that it is completely possible to find out the hacker," Nguyen wrote.
Through analyzing the log files of the two servers it controls, Bkis said the attacks utilized 166,908 PCs in 74 countries that had been infected. That figure is significantly higher than the "several tens of thousands" that other security companies had estimated were involved.
The largest number of infected PCs were in South Korea followed by the U.S., China, Japan, Canada, Australia, the Philippines, New Zealand, the U.K. and Vietnam.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts