PDA

View Full Version : Attacks by "Anonymous" WikiLeaks proponents not anonymous




tangent4ronpaul
12-13-2010, 11:16 AM
http://www.pcworld.com/businesscenter/article/213395/website_attackers_could_be_easily_traced_researche rs_say.html

researchers at the University of Twente in Enschede, Holland, say it is easy for ISPs to identify those using the tool, as it takes no measures to protect the identity of its users, according to their paper.

There are several versions of the Low Orbit Ion Cannon: one is a client application that is downloaded by a user and can be remotely controlled via an IRC (Internet Relay Chat) or be manually configured. The other is a JavaScript-based Web site.

With the client application, the targeted Web site can see the real IP (Internet Protocol) address of the computer conducting the attack, the researchers wrote. The IP address can be linked to the ISP providing the service, which can then investigate which subscriber the address corresponds too. The same condition happens when someone uses the Web-based tool.

One method used by those conducting a DDOS attack is to configure the program to use a fake IP address, but the Low Orbit Ion Cannon does not do that. DDOS attacks can also be coordinated using a botnet, or a network of machines that have been compromised. The owners of those computers are usually unaware their computers is infected and taking part in an attack.

The danger with the WikiLeaks attacks is that many of those less tech-savvy people eager to join the online campaign may be unaware that they can be traced.

[...]

The DDOS attacks, dubbed Operation: Payback, by Anonymous appear to be continuing, according to security vendor Imperva. The Low Orbit Ion Cannon has been downloaded about 67,000 times, Imperva said.

MasterCard, which stopped processing payments for WikiLeaks, was attacked again over the weekend, with statistics showing it experienced some downtime, according to Netcraft. A vast majority of security vendors are now labeling the Low Orbit Ion Cannon a threat and will block the program, Imperva said.

Imperva also said it has been monitoring some of the communication between people coordinating the attacks. Those attackers are recommending to develop a system by which people are lured to some other content, such as pornography, but by visiting the website would invisibly launch the DDOS JavaScript tool.

==========

http://www.utwente.nl/ewi/dacs/news/archive/2010/wikileaks.doc/index.html

Attacks by "Anonymous" WikiLeaks proponents not anonymous

For a number of days the websites of MasterCard, Visa, PayPal and others are attacked by a group of WikiLeaks supporters (hacktivist). Although the group calls itself "Anonymous", researchers at the DACS group of the University of Twente (UT), the Netherlands, discovered that these hacktivists are easy traceable, and therefore anything but anonymous. The LOIC (Low Orbit Ion Cannon) software, which is used by the hacktivists, was analyzed by UT researchers, who concluded that the attacks generated by this tool are relatively simple and unveil the identity of the attacker. If hacktivists use this tool directly from their own machines, instead of via anonymization networks such as Tor, the Internet address of the attacker is included in every Internet message being transmitted. In the tools no sophisticated techniques are used, such as IP-spoofing, in which the source address of others is used, or reflected attacks, in which attacks go via third party systems. The current attack technique can therefore be compared to overwhelming someone with letters, but putting your address at the back of the envelop. In addition, hacktivists may not be aware that international data retention laws require that commercial Internet providers store data regarding Internet usage for at least 6 months. This means that hacktivists can still be traced easily after the attacks are over.

A complete report about that can be downloaded from this link.

http://www.simpleweb.org/reports/loic-report.pdf

-t

RonPaulFanInGA
12-13-2010, 11:22 AM
Yep. Dutch police have already arrested a 16-year-old for pro-Wikileak cyber attacks.

http://www.esecurityplanet.com/headlines/article.php/3916741/article.htm

talkingpointes
12-13-2010, 11:27 AM
"DDOS attacks can also be coordinated using a botnet, or a network of machines that have been compromised. The owners of those computers are usually unaware their computers is infected and taking part in an attack."

Given that bit of information, wouldn't it be hard to prove in a court setting that someone to place in said attacks ? I would also assume the ones really coordinating the attacks hid behind more than a firewall making them incredibly hard to find.

tangent4ronpaul
12-13-2010, 11:35 AM
Yep. Dutch police have already arrested a 16-year-old for pro-Wikileak cyber attacks.

http://www.esecurityplanet.com/headlines/article.php/3916741/article.htm

He's allready been released but it's inclear if he will be charged. They also picked up a 19yo who apparently faces some more serious charges. They are upset about the first target hit, a Dutch Bank, and from reports at the time, their web page was hacked and replaced with a rick roll.

-t

specsaregood
12-13-2010, 11:37 AM
Given that bit of information, wouldn't it be hard to prove in a court setting that someone to place in said attacks ?

Not when they seize your computer when they arrest you, then go through it and find that you posted about, had the application installed so that your user loaded/ran it, etc, etc,etc.

Nate-ForLiberty
12-13-2010, 11:48 AM
ok, i'm not a computer wiz, but couldn't you use a proxy?

fisharmor
12-13-2010, 11:48 AM
Not when they seize your computer when they arrest you, then go through it and find that you posted about, had the application installed so that your user loaded/ran it, etc, etc,etc.

This just creates a market for having your PC intentionally infected by a third party.

teacherone
12-13-2010, 11:49 AM
you gotta be stupid to give anonymous control of your pc.

specsaregood
12-13-2010, 11:51 AM
ok, i'm not a computer wiz, but couldn't you use a proxy?

That would result in DOS'ing the proxy. :)

fisharmor
12-13-2010, 11:51 AM
you gotta be stupid to give anonymous control of your pc.

Unless you ARE anonymous, and you're setting up a legal defense.

tangent4ronpaul
12-13-2010, 11:52 AM
This just creates a market for having your PC intentionally infected by a third party.

Interesting thought, but how would you know it got infected with what you intended and it wasn't sending out spam for Viagra or fake Rolex's or something?

-t

fisharmor
12-13-2010, 11:54 AM
Interesting thought, but how would you know it got infected with what you intended and it wasn't sending out spam for Viagra or fake Rolex's or something?

-t

I'm not anonymous, I'm just a run-of-the-mill IT guy who isn't even in hardware or security.
I'm mainly antagonizing just to show how stupid the authorities are.

tangent4ronpaul
12-13-2010, 05:39 PM
//

tangent4ronpaul
12-13-2010, 07:54 PM
//