WikiLeaks furor spawns rival DDoS battles
'Anonymous' group launches attacks against Swiss bank for freezing WikiLeaks founder Julian Assange's account
Computerworld - An anonymous, loosey affiliated group that has been responsible for a series of recent distributed denial-of-service (DDoS) attacks against entertainment industry Web sites over copyright issues, has started attacking organizations viewed as being hostile to WikiLeaks, says a PandaLabs researcher.
The group, dubbed Anonymous, launched a DDoS attack on Monday that knocked out Swiss payment transaction firm PostFinance's Web site.
The attack was in apparent retaliation for the firm's freezing of an account set up by WikiLeaks founder Julian Assange, said Sean-Paul Correll, a threat researcher at PandaLabs, which is an international network of virus research and technical support centers.
PostFinance's main Web site was unavailable for several hours but appeared to have been restored by late Monday afternoon.
The attack on PostFinance was preceded by one against PayPal's blog site over the weekend, Correll said. That attack was apparently prompted by PayPal's decision to cut off money services to WikiLeaks last week, after WikiLeaks started releasing thousands of classified diplomatic cables written by U.S. State Department officials.
The PayPal attack began at 4.00 a.m. Pacific time on Saturday and resulted in the blog being unavailable for a total of more than eight hours, Correll said.
Meanwhile, Anonops.net, a site that Anonymous has used to announce its attack plans, came under a massive DDoS attack earlier on Monday, apparently by those opposed to WikiLeaks. In an ironic twist, users attempting to reach the Anonops site were being redirected to PostFinance's Web site late Monday evening.
A lengthy statement posted on the anonymous group's Web site listed several organizations that the group claimed had stifled WikiLeaks' effort to release the documents. "We will find and will attack those who stand against Wikileaks and we will support WikiLeaks in everything they need," the statement said.
Anonymous said it will offer WikiLeaks an additional site for mirroring the leaked documents. The group also claimed that it will create 'counter-propaganda' and organize DDoS attacks on "various targets related to censorship."
Anonymous' campaign over copyright enforcement issues, known as Operation:Payback, has resulted in DDoS attacks that have knocked out sites belonging to the Recording Industry Association of America, the Motion Picture Association of America and others.
In the statement announcing support for Assange, the organizers of Anonymous declared that "Operation:Payback has come out in support of WikiLeaks and has declared war on the entities involved in censoring [their] information."
The online tussle between those opposed to WikiLeaks' campaign and those supporting it highlights how the Internet is increasingly becoming the battleground for all sorts of causes, Correll said.
"People are starting to figure out they can use technology to fight back," he said. "They have realized they don't have to just stand in a picket line. This has been going on for a few years, but it's getting more organized."
WikiLeaks began releasing tens of thousands of classified cables from the U.S. Department of State last Sunday. After a massive DDoS against its French hosting firm rendered the site unavailable for several hours, WikiLeaks quickly moved to Amazon's cloud hosting service last Monday.
Just two days later, Amazon booted WikiLeaks off its servers, forcing WikiLeaks to move its site once again, this time to a Swedish hosting company.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Snowden advocates at SXSW for improved data security
- Joomla receives patches for zero-day SQL injection vulnerability, other flaws
- NSA used 'European bazaar' to spy on EU citizens
- Target CIO resigns following breach
- Evan Schuman: Mobile IT Roach Motel: Data checks in, but it won't check out
- Sears finds no evidence of data breach -- yet
- Gameover malware is tougher to kill with new rootkit component
- Mobile app for RSA Conference exposes personal data
- UK man charged with hacking Federal Reserve
- Bloomberg clamps down with data-access policies after scandal
Read more about Data Security in Computerworld's Data Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Top tips for securing big data environments - Why big data doesn't have to mean big security challenges Organizations don't have to feel overwhelmed when it comes to securing big data environments. The same security fundamentals for securing databases, data warehouses...
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Three guiding principles for data security and compliance Data security is a moving target-as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.
- How SIEM Addresses the Challenges of Big Security Data This webcast will help you understand today's big data security challenges and how intelligent and scalable SIEM solutions give IT the tools and... All Data Security White Papers | Webcasts