Experts unsure whether Iran is behind bank DDoS attacks
Sophistication of attacks points to possible state sponsor, but there's no proof yet, say security experts
Computerworld - Though U.S. officials blamed Iran for an ongoing stream of distributed denial of service attacks (DDoS) against major U.S. banks, security experts say there's not enough evidence yet to assign blame.
The security experts say that the attacks over the past few months appear to be very well planned and that the attackers have much knowledge of the weak spots in U.S. financial services networks, which could make them state sponsored.
Meanwhile, the ongoing attacks have reportedly prompted some banks to seek the help of the National Security Agency (NSA).
The Washington Post on Friday quoted an unnamed bank official as saying that banks are seeking NSA help due to a growing sophistication of DDoS attacks against them.
Earlier this week, the New York Times quoted a former official in the U.S State and Commerce Department as saying that there is "no doubt" within the U.S. government that Iran is behind the attacks.
A group calling itself "Izz ad-Din al-Qassam Cyber Fighters" has claimed responsibility for a series of DDoS attacks against several large U.S. banks including Wells Fargo, JP Morgan Chase, Bank of America and U.S. Bancorp.
The group claims to be based in Iran and says the attacks are in protest of YouTube's refusal to take down a trailer of the controversial anti-Islam movie that roiled much of the Middle East last year.
The DDoS attacks began last September and have shown no signs of abating.
If anything, the attacks have become more sophisticated and disruptive, said Scott Hammack, chief executive officer at Prolexic Technologies, a security firm that has been helping some of the largest U.S. banks fend off the attacks.
Unlike past DDoS attacks, the ongoing attacks are much more high-bandwidth and more frequent, Hammack said. For instance, Prolexic recently observed high-bandwidth attacks against two separate banks that were launched at the same time.
One of the attacks generated 75GBps of DDoS traffic while the other generated 45GBps. Such high-bandwidth attacks, which used to occur once or twice a year, have become almost routine, he said.
Unlike past DDoS attacks, in which attackers commanded hundreds of thousands of infected PCs to send streams of useless traffic to targeted systems, the latest ones involve thousands of comprised servers capable of generating far greater DDoS traffic, he said.
Whoever is behind the attacks also appears to be using so-called "push technology" to control the infected servers in real-time he said.
The technology allows attackers to turn on and turn off DDoS attacks and redirect DDoS streams at will, Hammack said. "They have a very good knowledge of what infrastructure to go after, particularly weak spots in the infrastructure," he said.
- New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on
- Needed: Breach detection correction
- Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief
- Cyberattacks could paralyze U.S., former defense chief warns
- Syrian Electronic Army shanghais Microsoft's Twitter account, blog
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Jyske Bank extends brand message to more than one million visitors a month
- IBM WebSphere Portal software helps bank offer a clearly differentiated digital experience
- The Big Data Opportunity for HR and Finance
- If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,... All Financial IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Financial IT Webcasts