Security experts scramble to decipher Twitter attack
Facebook exec claims Twitter, Google and others attacked to silence pro-Georgian activist
Computerworld - Security analysts Thursday scrambled to find a motive behind the distributed denial-of-service attacks that brought down Twitter for several hours, and also hit Facebook, Google and LiveJournal.
With little information to go on, researchers ended up speculating on who launched the attacks and why, although several agreed that Twitter's infrastructure needed immediate strengthening.
"If you monitor the hacking forums, it's clear they're pissed at Twitter," said Richard Stiennon, founder of IT-Harvest, a security research firm. "Twitter came out of nowhere. Hackers hated that. They'd been using forums and IRC to communicate, and all of a sudden, the rest of the world has their own thing in Twitter."
To Stiennon's thinking, the rise of Twitter -- and the backlash against it -- resembles the situation in the 1990s, when AOL rose to prominence, but tech-savvy users denigrated it as little more than a glorified BBS (bulletin board system).
"It's the same thing now," Stiennon said. "They look at Twitter and think, 'there goes the neighborhood.' So they wanted to demonstrate that they could take it down and generate news at the same time."
Roger Thompson, chief research officer at AVG Technologies, has a different idea.
"I think it was a vigilante," he said, "who wants to call attention to the danger of botnets."
Thompson's theory posits that the vigilante -- perhaps a security professional -- assembled a small botnet, then aimed it at Twitter and Facebook, which was also attacked Thursday. He based his idea on several similarities to the distributed denial-of-service (DDoS) attacks that hammered U.S. government and South Korean commercial sites in early July.
Those attacks, at one point thought to originate from North Korea, were unfocused, had no noticeable political agenda and most important, ended with the botnet controller ordering the machines to self-destruct by wiping their hard drives.
"Who builds a botnet, then destroys it?" Thompson asked. "That's just crazy."
In fact, Thompson said he believed the Twitter hacker was the same person who ran the U.S./South Korea DDoS almost exactly a month ago. "No one profits from DDoS-ing Twitter," he said. "The only possible explanation is that someone wanted to make people think about something, and I think that something is botnets.
"Botnets are a very big problem, but no one does anything about them," he added.
Both Stiennon and Thompson used the word "easy" to describe the kind of DDoS attack required to successfully attack Twitter and other Web sites. "It wouldn't take a real big botnet," said Thompson. One with 20,000 to 30,000 bots could have spoiled Twitter's day."
A different motivation surfaced late Thursday, when a Facebook executive told CNET News that his company believed the attacks were directed against one individual, a pro-Georgian blogger identified only as "Cyxymu," who had accounts on Facebook, Twitter, LiveJournal and Google Inc.'s Blogger and YouTube.
- Twitter's slipping user growth spooks investors
- Get ready to tweet your questions for Twitter's first earnings call
- Super Bowl sets Twitter record, as Volkswagen launches social war room
- Perspective: Twitter's success opens up IPO pipeline
- Update: Twitter goes public at $45 a share
- With IPO cash influx, Twitter could be bigger threat to Facebook
- Ahead of IPO, Twitter shines up multimedia image
- Twitter kicks off pre-IPO investor roadshow
- As its IPO looms, Twitter faces investor grilling
- Twitter experiments with 'Event Parrot' -- a news delivery service
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Knowledge Center White Papers | Webcasts