Update: MasterCard, Visa others hit by DDoS attacks over WikiLeaks
Supporters of whistleblower Web site step up attacks
Computerworld - The main Web site of MasterCard was knocked offline today in a large distributed denial of service (DDoS) attack apparently launched in retaliation for the credit card company's decision this week to cut off services to WikiLeaks.
Similar, much smaller attacks have also been detected against numerous other sites, including those belonging to U.S. Sen. Joseph Lieberman (I-Conn.) and former Alaska Gov. Sarah Palin, according to security researcher Sean-Paul Correll of PandaLabs. Correll has been maintaining a frequently updated blog on the unfolding attacks.
According to Correll, Visa's Web site appears to have been hit with two separate sets of DDoS attacks. The first was launched around 4 a.m. ET and caused intermittent site outages for several hours. No one has claimed responsibility for those attacks. Then at 4 p.m. today the site was hit again with another DDoS attack, this time by Anonymous. The attacks slowed web traffic to the Visa site considerably, Correll said.
Also targeted have been the Web sites of Swiss payment transaction firm PostFinance, as well as PayPal and EveryDNS, all three of whom terminated services to WikiLeaks after the site began publishing thousands of leaked U.S. State Department cables last week.
In addition, DDoS attacks have been launched against the Swedish prosecutors who are pursuing rape charges against WikiLeaks founder Julian Assange. The site of the lawyer representing the two women who were allegedly assaulted by Assange was also hit, Correll said today.
The attacks have resulted in varying degrees of downtime for the targeted Web sites. MasterCard's site, for instance, was largely unavailable for hours after the DDoS attacks against it began shortly after 4 a.m. ET, Correll said. And the attacks against PostFinance have so far resulted in more than 33 hours of downtime for the firm.
In a brief statement, MasterCard this afternoon said it has made "significant progress" in restoring full service to its corporate site. Despite "limited interruptions," cardholders can continue to use their Mastercards securely, the company said. "Our core processing capabilites have not been compromised and cardholder account data has not been placed at risk."
However, the attacks against Lieberman's Senate site and Palin's sarahpac.com appear to have caused much less disruption. According to statistics on Correll's PandaLabs blog, Lieberman's site was down for barely 12 minutes, while Palin's was knocked offline for about 25 minutes.
An anonymous, loosely affiliated group of hackers and activists, calling themselves Anonymous, claimed responsibility for the attacks against MasterCard and the others. The organizers of the group have an ongoing campaign called Operation:Payback that is focused on attacking entertainment industry Web sites over copyright enforcement issues.
Earlier this week, the group announced its support for WikiLeaks and announced Operation:Avenge Assange, which is targeted at "entities involved in censoring [WikiLeaks'] information."
- US agencies to release cyberthreat info faster to healthcare industry
- UPS now the third company in a week to disclose data breach
- Healthcare organizations still too lax on security
- Why would Chinese hackers want US hospital patient data?
- About 4.5M face risk of ID theft after hospital network hacked
- Supervalu breach shows why move to smartcards is long overdue
- Grocery stores in multiple states hit by data breach
- Update: Payment cards with chips aren't perfect, so encrypt everything, experts say
- U.S. agencies halt background checks by contractor after cyberattack
- Five unanswered questions about massive Russian hacker database
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts