GoDaddy hit with a 21 million PPS attack

From their post:

What Happened?

You might have noticed that some of you had trouble accessing your Go Daddy-hosted site over the weekend, March 25-26. And you’re also probably asking, “What happened?”

The short of it: We were the target of a 21-million-packets-per-second Distributed Denial of Service (DDoS) attack.

A DDoS attack is an attempt to shut down a network by flooding it with nonsense requests. And 21 million packets per second is a lot of nonsense.

To put that into perspective: If it takes 5 packets per second to load the average website, then clicking refresh a few times would generate 20 packets per second. So think of 21 million packets per second as clicking refresh on your browser as fast as you can, while inviting 10 million of your closest friends to join you.

Read their full article here:

GoDaddy full article

QNX Announces First RTOS to Help Device Manufacturers Achieve Both Safety and Security Certification

Certified Plus can save customers time and expense by speeding rigorous certification processes and help accelerate their time to market

NUREMBERG, GERMANY–(Marketwire – March 1, 2011) - EMBEDDED WORLD (STAND 11-324) – QNX Software Systems Co., a global leader in operating systems and middleware for connected embedded systems, today announced the first realtime operating system (RTOS) to provide both safety and security certification, allowing manufacturers of mission-critical systems to significantly reduce the time and expense of certifying their end-products, including medical, automotive, and industrial devices.

QNX Neutrino Realtime Operating System (RTOS) Certified Plus™ is the only RTOS to offer both IEC 61508 certification at Safety Integrity Level 3 (SIL 3) and Common Criteria ISO/IEC 15408 certfication at Evaluation Assurance Level 4+ (EAL 4+).

“QNX Neutrino RTOS Certified Plus is an industry first, providing a significant competitive advantage to device manufacturers who must address rigorous demands for safety and security,” stated Derek Kuhn, vice president, sales and marketing, QNX Software Systems. “Our engineers have delivered the first product offering combining safety and security certification that can change the way companies bring products to market by reducing the time and expense required for them to get their end-products certified.”

Many of the systems vital to our daily living, work, and health are now controlled by software running on microprocessors embedded in cars, medical devices, power plants, and the energy grid. As the software complexity of these systems increases, so does the need for software components certified to meet stringent dependability and security requirements — these systems cannot fail.

Certification to IEC 61508 SIL 3 provides independent validation that QNX Neutrino RTOS Certified Plus delivers a very high level of reliability and risk reduction when used in safety-critical systems for medical, transportation, energy generation, process control, and other industries. Certification to the Common Criteria for Information Technology Security Evaluation provides validation from a certified laboratory that QNX Neutrino RTOS Certified Plus fulfills the functional security requirements and the enhanced methodologies and security controls required for EAL 4+.

Designed for systems that have low tolerance for failure, QNX Neutrino RTOS Certified Plus employs a modular microkernel architecture in which applications, device drivers, file systems, and networking stacks all run as separate, memory-protected components. It is the only certified RTOS to support the parallelism necessary for successful multi-core designs. It also supports adaptive partitioning, an efficient form of CPU time partitioning that prevents malicious code and denial-of-service (DoS) attacks from monopolizing the CPU.

QNX Neutrino RTOS Certified Plus is also POSIX-compliant, which allows application developers great flexibility to port applications to the platform.

Availability

QNX Neutrino RTOS Certified Plus will be available in Q2 2011. For more information, please send email to certified_plus@qnx.com.

QNX Embedded World Booth — Demonstration Highlights

QNX Software Systems will present the following demonstrations this week at Embedded World:

– Medical Reference Demo — Showcases a flexible Human Machine Interface (HMI), connectivity to Continua Certified™ medical devices, and wireless connectivity to a BlackBerry® PlayBook™ tablet.

– Interactive Home Security Demo Broadband home management solution from iControl Networks enables homeowners to see and control their home, including security and energy systems, via the Internet, mobile devices, and in-home touch screens.

– QNX CAR™ Application Platform Demo Includes digital instrument cluster, multimedia console, re-skinnable HMI, hands-free calling, streaming audio, Webkit browsing, and device connectivity to smartphones and other devices.

QNX Speakers at Embedded World Conference

– Tuesday, March 1, 10:00–10:30 — The Joy of Scheduling

– Wednesday, March 2, 14:15–15:00 — In-Field Debugging: Diagnosing Software Faults While Maintaining Availability

– Thursday, March 3, 11:30–12:30 — Using an IEC 61508-Certified RTOS Kernel for Safety-Critical Systems

About QNX Software Systems

QNX Software Systems Co., a subsidiary of Research In Motion Limited (RIM) (NASDAQ:RIMM; TSX:RIM), is a leading vendor of operating systems, middleware, development tools, and professional services for the embedded systems market. Global leaders such as Cisco, Daimler, General Electric, Lockheed Martin, and Siemens depend on QNX technology for network routers, vehicle telematics units, industrial control systems, medical instruments, security and defense systems, and other mission- or life-critical applications. Founded in 1980, QNX Software Systems Co. is headquartered in Ottawa, Canada; its products are distributed in over 100 countries worldwide. Visit www.qnx.com.

QNX, Momentics, Neutrino, Aviage, Photon and Photon microGUI are trademarks of QNX Software Systems GmbH & Co. KG, which are registered trademarks and/or used in certain jurisdictions, and are used under license by QNX Software Systems Co. The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks of Research In Motion Limited. All other trademarks belong to their respective owners.

QNX Software Systems Co. (QNX) is a subsidiary of Research In Motion Limited (RIM). Forward-looking statements in this news release are made pursuant to the “safe harbor” provisions of the U.S. Private Securities Litigation Reform Act of 1995 and applicable Canadian securities laws. When used herein, words such as “expect”, “anticipate”, “estimate”, “may”, “will”, “should”, “intend,” “believe”, and similar expressions, are intended to identify forward-looking statements. Forward-looking statements are based on estimates and assumptions made by QNX in light of its experience and its perception of historical trends, current conditions and expected future developments, as well as other factors that QNX believes are appropriate in the circumstances. Many factors could cause QNX’s actual results, performance or achievements to differ materially from those expressed or implied by the forward-looking statements, including those described in the “Risk Factors” section of RIM’s Annual Information Form, which is included in its Annual Report on Form 40-F (copies of which filings may be obtained at www.sedar.com or www.sec.gov). These factors should be considered carefully, and readers should not place undue reliance on QNX’s forward-looking statements. RIM and QNX have no intention and undertake no obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise, except as required by law.

Source: http://www.marketwire.com/press-release/QNX-Announces-First-RTOS-Help-Device-Manufacturers-Achieve-Both-Safety-Security-Certification-1403656.htm

Hillary Clinton’s plan to topple dictators with an open Internet

The ouster of dictators in Egypt and Tunisia made it imperative for Hillary Clinton to lay out a US plan to keep the Internet open for people seeking freedom. But exactly how remains an open question.

Secretary of State Hillary Rodham Clinton said all the right things in a speech on Internet freedom today. She was modest in admitting that the US government didn’t have all the answers – or even know all the right questions to ask – in shaping an open Internet worldwide in the future.

She urged repressive regimes to consider the “dictator’s dilemma” – that when they restrict or harass Internet use it will only harm them and their country in the long run. She termed preserving a free and open Internet “one of the grand challenges of our time.”

The fall of autocratic regimes in Tunisia and Egypt – with the possibility of more to come – came about at least in part because of online social media, from Twitter to Facebook to YouTube. The debate over just how crucial these new media were to the uprisings is just beginning. One could reasonably argue that outstanding coverage by Al Jazeera, in the form of traditional old-style televised reporting, played just as significant a role. As is often pointed out, the Egyptian protest continued on to a successful conclusion even after the government pulled the plug on Internet access.

But what’s already clear is that Internet’s role was real and significant. And now the Obama administration has begun to move beyond words to actions in promoting a free Internet worldwide. Clinton said that it will spend $20 million this year and $25 million next year funding a variety of programs, acting as a kind of venture capitalist to underwrite a number of approaches.

In recent days the State Department has set up its own Twitter feeds in Arabic and Farsi, and Clinton said a similar effort in Chinese will soon follow. She also pledged that monitoring and responding to Internet threats is now part of the State Department’s core mission.

That’s a start. More is needed. One key effort will be finding ways to help people get around fire walls that governments place on their Internet users, freeing their citizens to find out what the rest of the world is saying and doing. Individuals need to know how to set up secure e-mail accounts and how to defend their websites against denial of service attacks.

No one should assume that the Internet will somehow automatically be a force for good. As former journalist and savvy Internet watcher Rebecca MacKinnon points out, while King George VI used the relatively new medium of radio to rally Britain during World War II, Joseph Goebbels in Germany used it to spread Nazi propaganda. Technology plays no favorites in a war of ideas.

Twitter and other online social media themselves don’t represent a “silver bullet” that will pull down dictators and solve the world’s problems. That’s still up to courageous individuals.

But the Internet does represent an important tool – in spreading that courage, in assembling crowds – that must be valued and protected. A race is on between those trying to restrict online access – or infiltrate it and turn it into a means of repression – and those that prize openness.

The administration has been right to listen, test, and experiment. But the move to bigger, bolder actions shouldn’t wait forever.

Source: http://www.csmonitor.com/Commentary/the-monitors-view/2011/0215/Hillary-Clinton-s-plan-to-topple-dictators-with-an-open-Internet

VoIP security issues: How you might become a target for TDoS attacks

The maturation of enterprise VoIP deployments has opened IT organizations to a new world of VoIP security issues — telephony denial of service (TDoS) attacks, flagged by the FBI last year as a danger to consumers. Enterprise and contact center networks will also be attractive TDoS targets as hackers try to profit directly off attacks or use them as a diversion for a bigger con.

Like distributed denial of service (DDoS) attacks, TDoS attacks block legitimate VoIP sessions or disrupt business by flooding or hijacking IP telephony infrastructure with bogus calls. These attacks can saturate all of the lines on a SIP trunk to block phone calls or cause phones to ring incessantly.

In addition to the risk of data or financial theft that TDoS attacks pose — almost always by virtue of their ability to cause a diversion — they also paralyze user productivity and block legitimate business transactions or processes.

Dan Fontaine, senior vice president of technology at VIPdesk, a virtual contact center outsourcer, is still in the planning phases of deploying VoIP. But VoIP security issues such as TDoS prevention are already on his radar as potential threats to his business.

“We haven’t come up with a plan to address TDoS yet, but it is on the roadmap,” Fontaine said. “We are going to keep the VoIP traffic within the encrypted tunnel created by the Citrix Access Gateway. As a result, the VoIP ports will not be exposed to the Internet.”

Service providers have spent years wrestling with TDoS attacks, but those attacks were primarily aimed at theft of service, said Jonathan Zarkower, director of product marketing at Acme Packet, a session border controller (SBC) vendor. Hackers use enterprise TDoS attacks almost exclusively for financial gain, and most customers who have reported them said the attack was an inside job, he said.

“We actually see more inside attacks than outside attacks. There’s a lot of money to be made by disgruntled employees,” Zarkower said. “As IP continues to proliferate in the enterprise, I think we’re going to see more of this.”

Mitigating VoIP security issues: Track more than call volume

Acme Packet’s Net-Net series of SBCs has the ability to identify, intercept and shut down potential TDoS attacks, Zarkower said.

The appliances’ software can detect the insertion of white noise or other media, abnormal signals, call establishment and call flow rates. Net-Net SBCs by default block IP multipathing protocols (IPMP) which Zarkower said are not essential to voice communications and are often used to launch a TDoS attack.

“There are multiple facets to a TDoS attack, and whatever solution you’re using also has to be multifaceted,” he said. “It’s more than being able to detect unusually high call volume … [and prevention] also means implementation of organization-wide security practices, polices and enforcement.”

Contact centers, particularly in the financial and healthcare industries, are prime targets for TDoS attacks due to the high call volume and sensitive data they handle, according to Mykola Konrad, director of enterprise products at Sonus Networks, another SBC vendor.

Sonus recently announced two VoIP security applications, VoiceSentry Analyzer and VoiceSentry Guardian, which work in conjunction with Sonus’ SBC and take an application-layer approach to identifying and shutting down bogus calls.

VoiceSentry Analyzer, which operates on Oracle Netra servers, runs alongside Sonus’ SBCs and monitors call detail records (CDRs) and other metrics in real time as it looks for anomalies. It forwards suspicious calls to a second appliance, VoiceSentry Guardian, which runs on Sonus’ proprietary hardware. Guardian executes an audio CAPTCHA test on those suspicious calls.

“It routes you to a special announcement that says, ‘Please [dial] 1234,’ and if you’re a human being, you say, ‘This is idiotic’ and [dial] 1234,” Konrad said. “But if you’re a robot, you would have no idea what to do.”

Administrators can customize the test to sound like the rest of its Interactive Voice Response (IVR) system and disguise the CAPTCHA to appear more like a usual prompt a caller would expect, such as a prompt for an ID number, he said.

Telecom engineers can configure Guardian with policies that dictate how bogus calls are handled from there, whether they’re rerouted to law enforcement or simply dropped. Analyzer comes pre-populated with common attack patterns, and customers can subscribe to receive regular updates from Sonus’ database.

Sonus’ SBCs have traditionally prevented TDoS attacks at the packet layer, flagging malformed packets as phony. But that did nothing to stop calls from a software application designed to tie up lines with white noise, as one customer recently experienced, Konrad said.

The customer, which he declined to identify, had historically monitored the call volume in its contact center very closely. Telecom engineers there noticed minor increases in call volume — nothing that would be flagged as an attempt to overwhelm equipment with bottlenecks — but their software detected none of the hallmarks of an attack, such as signal irregularities or malformed packets, Konrad said. At the packet layer, they looked like legitimate sessions.

The small spikes in call volume coincided with reports from call center agents that they were receiving mysterious calls that contained just four minutes of white noise or siren sounds. After working with the FBI and their service provider, AT&T, the telecom engineers learned the calls originated from a hacker in Manitoba, Canada, Konrad said.

The hacker had purchased a bevy of SIP trunks and written a SIP dialing script that would call toll-free numbers and dial 8, which he had determined would likely bypass the IVR system to get a live agent, Konrad said. The hacker had misrepresented himself as a business customer “who just happened, as part of his business, to have to make many toll-free calls,” he said.

The hacker threatened his local carrier that he would take his “business” to another service provider if the local carrier didn’t give him a cut of the toll-free tariffs it collected from contact centers the hacker had targeted, Konrad said. The carrier obliged, he said.

“The very first thing people think is, ‘What’s wrong with the equipment?'” he said. “What you need is an application-aware appliance of some sort to really take a look at the media coming through … and at some level to even listen to the voice and say, ‘Is this a real human?'”

Source: http://searchunifiedcommunications.techtarget.com/news/2240031995/VoIP-security-issues-How-you-might-become-a-target-for-TDoS-attacks

Data security systems must protect against ‘increasing hacktivism’

The evolution of cyber-crime from “mischievous virus-writing” to financially or politically motivated attacks is a trend likely to continue, a new report has revealed.

Data security firm Sophos’ Security Threat Report 2011 has analysed the threats and trends of 2009 and 2010 to predict what will happen in the year ahead.

The company suggested that the WikiLeaks scandal and the following Distributed Denial-of-Service (DDoS) attacks on organisations that had withdrawn their support illustrated a fundamental change in the motivation behind cyber crime.

A virus unleashed in 2010, called the Stuxnet worm, compounded this change by targeting the systems used in industrial applications and nuclear facilities globally, the report suggested.

“These exemplify the development of cybercrime from the initial stages of proof-of-concept and mischievous virus-writing, through financially motivated, organised criminal activity … and finally a third, political motivation,” the company said.

McAfee Labs has also warned organisations to improve data security as politically motivated attacks, commonly known as ‘hacktivism’, will increase throughout 2011 and beyond.

Kroll Ontrack is the world’s leader in data recovery and data management services, working to keep your data safe and always available.

Posted by Edward Clark

Source: http://www.ontrackdatarecovery.co.uk/data-recovery-news/articles/data-security-systems-must-protect-against-increasing-hacktivism355.aspx

Website attacks raise questions about African data security

An increase in hacking by online fraudsters targeting African governments and corporations is raising questions about the safety of the region’s Internet infrastructure.

An increase in hacking by online fraudsters targeting African governments and corporations is raising questions about the safety of the region’s Internet infrastructure.

The hacking is calling into question the security of data held by governments in the region as they adopt e-governance strategies aimed at decentralizing operations and enhancing efficiency. Over the past year, the region has seen more incursions from hackers attempting to gain access to databases for personal information. In addition, some hackers target government websites in order to show their abhorrence of oppressive regimes.

Last week, the Zimbabwean, Kenyan and Tunisian governments’ websites were hit by hackers who defaced the sites and prevented them from functioning efficiently.

Meanwhile, the Kenyan government is planning to build a data center to serve East and Central Africa in a bid to ease the region’s reliance on Europe and the U.S. for data backup. The Rwandan government has also built a database center for the country’s data storage that will provide data backup for other countries in the region.

After the attacks, Zimbabwean Minister of Information and Communication Technology (ICT) Nelson Chamisa said the country is now making efforts to tighten security on its government websites in order to prevent similar strikes. As in Kenya and Tunisia, the Zimbabwean government websites were hit by distributed denial-of-service (DDOS) attacks that rendered them unavailable.

At one point, a defaced Ministry of Finance website displayed a message posted by a group of hackers that identified itself as ‘Anonymous.’

While the Zimbabwean government is still probing the matter, Chamisa said at a media briefing last week that cybersecurity is “now on the front burner of the Zimbabwean government’s work program.”

The attacks have forced the Zimbabwe attorney general to form a commission to investigate the WikiLeaks diplomatic cable revelations and to bring treason charges against anyone found to be colluding with foreign governments. The hackings in Zimbabwe came after the country’s first lady sued a local newspaper for US$15 million for publishing a WikiLeaks cable that linked her to alleged trade in illicit diamonds.

The Anonymous hacker group said it had targeted President Robert Mugabe’s administration for actions taken by government officials to suppress information about the thousands of secrets WikiLeaks released.

In 2009, the Zimbabwean website went offline and was replaced by an advertisement from Microsoft.

Kostja Reim, CEO of Security Risk Solution, said more than 80 percent of the region’s websites are vulnerable to hackers. This is because the governments and institutions have not moved to upgrade information security systems to protect the sites from local and international hackers.

In 2008, the Kenyan government lost millions of dollars to Russian hackers when it attempted to send the money to Ukrainian arms dealers over an unsecured protocol.

Anonymous has announced they have started a recruitment exercise for hackers to take down government websites. As a result, Africa is expected to experience increased cyber-attacks this year unless governments move to upgrade information security systems to protect the sites. Botswana, Namibia and Uganda are some of the countries expected to be targeted by hackers for opposing WikiLeaks.

Source: http://news.idg.no/cw/art.cfm?id=80EFB60B-1A64-67EA-E49A820EB9391CF6

It’s time for a serious response

It has been clear for months that Australian Julian Assange – the founder of the WikiLeaks website – is guilty of crimes against the United States. His release of classified military and diplomatic documents has hurt this country severely. At the very least, he has placed the lives of thousands of American servicemen and women in jeopardy.

Yet President Barack Obama’s Justice Department, under Attorney General Eric Holder, has done nothing but claim it is investigating Assange.

Throughout the world, Assange is losing friends quickly. He is under indictment for sex crimes in Sweden, and under arrest in England. The Swiss government suspended a bank account he had hoped to use to safeguard his money. Several private companies, including PayPal, Mastercard and Visa, have stopped facilitating contributions to Assange.

In retaliation, a gang of computer hackers mounted denial-of-service attacks on some of the involved companies this week. They had limited success – in part because some cyber-heroes struck back, disabling several of the hackers’ servers.

Some of what the hackers are doing is criminal in nature. Clearly, Holder should order an investigation aimed at filing charges against them. Surely at least some of them can be tracked down and brought to justice, while Holder ponders whether to do anything about Assange.

Source: http://www.messengernews.net/page/content.detail/id/535346/It-s-time-for-a-serious-response.html?nav=5087

IPO.gov.uk – Less than an Hour Until Attack Begins

There doesn’t appear to be any shortage of targets in the seemingly unstoppable onslaught of DDoS (Distributed Denial of Service) attacks that began by Anonymous early last month. Targets have included the MPAA, RIAA, US Copyright Group, GM Legal, and the Copyright Alliance. The most successful attacks thus far have been against the Ministry of Sound (MoS) and ACS:Law. The MoS was forced offline for several days, while ACS:Law suffered one of the most devastating data breeches in UK history.

So now the target of Anonymous is the IPO.gov.uk website – or the Intellectual Property Office. This is the first time Anonymous has targeted a government website, indicating a level of fearlessness considering the possible ramifications. As its name suggests, the IPO governs and helps protect copyrights and intellectual property in the United Kingdom.

“We are the official government body responsible for granting Intellectual Property (IP) rights in the United Kingdom.”

While Anonymous doesn’t seem to have any inherent ill-will towards the organization, their motivation for attacking the IPO stems more from the IPO’s alleged support of the system that has moved decidedly against P2P and file-sharing. According to Anonymous, they picked the IPO for “Perpetuating the system that is allowing the exploitative usage of copyright and intellectual property.”

At the time of this writing, there is only 45 minutes until the attack commences. We’re not sure what kind of DDoS protection the IPO has, but we’re about to find out very soon. This attack represents the first coordinated attack since the GM Legal attack – the attack against GeneSimmons.com was conducted by an Anonymous splinter cell that had broken off from the main group. This further indicates that even if Anonymous is brought down, factions within the group are more than capable of continuing the effort.

Source: http://www.slyck.com/story2087_IPOgovuk_Less_than_an_Hour_Until_Attack_Begins

Five ways to defend against a DDoS attack

So you’re under attack. What now?

The economics of the Distributed Denial of Service (DDoS) attack tend to work in favour of the aggressor and not those attempting to protect online assets.

Most DDoS attacks, which most commonly involve a group of attackers flooding a web site with excessive amounts of requests in an effort to prevent it providing service, tend to be small-scale and short-lived. But in rare cases such attacks have brought server clusters – and sometimes entire companies – to their knees.

The question many Australian organisations have faced of late: is a DDoS attack worth defending against? And if you are unfortunate enough to be under attack, what should you do?

Assessing the risk in advance

Jose Nazario security researcher at Arbor Networks told iTNews businesses often wait until it is too late to prepare a strategy and only think mitigation once under attack.

“That’s not the right time try to figure who my service provider is, how do I contact them or to scream and beg them to help,” he said. “That’s the wrong time.”

Instead, organisations need to include DDoS mitigation as part of their contingency planning, he said.

Key questions customers should ask their service providers are: What protection is available? How does the customer request that protection? What does this protection cost? What is the expected response time? Who is the service provider’s main contact when an event occurs?

“These are pretty obvious questions, but they’re things that people forget,” Nazario said.

Today iTnews spoke to several IT security gurus to discuss mitigation strategies.

1. Beat it with bandwidth

The most basic response to a request or traffic flood is to have sufficient additional bandwidth to withstand an attack.

Larry Bloch, chief executive of Australian web host NetRegistry, believes the best protection is superior infrastructure.

The web host was recently caught in the crossfire of 4Chan users’ “Operation: Payback” DDoS against anti-piracy lobbyist Australian Federation Against Copyright Theft (AFACT).

The attackers directed 60,000 active HTTP connections and 100 Mbps of additional bandwidth at a cluster of servers that hosted AFACT’s website. But the attack had a wider impact since it targeted a load balancer that was servicing thousands of the host’s clients.

“The only real way to reliably protect yourself against this level of attack is to have bigger iron than the attackers – with more network bandwidth, more raw processing power,” Bloch told iTnews.

But competing with multiple distributed computing resources is expensive and difficult to manage, he concedes.

While bandwidth is viewed as an essential mitigation strategy, it can quickly become very expensive defence.

“Unless you’re monetising that bandwidth, you’re investment is a really expensive insurance policy,” said Nazario. “It’s an arms race that you’re always going to lose.”

Highlighting the problem, spokesperson for DDoS protection service Prolexic, Greg Burns, pointed out that the largest attack the company had responded was 103 Gbps in size.

“Transit of this traffic can be expensive – if not impossible – as most businesses [only] have bandwidth availability that is a small fraction of this,” Burns said.

Prolexic expects to see attacks of this size with greater frequency as attackers attempt to blow past today’s carrier-grade DDoS defenses built to cope with 10 Gbps attacks.

Similarly, Prolexic has noted that attackers are turning to more sophisticated methods, such as targeting applications with “low and slow” attacks on layer 7 applications, encrypting attack traffic and attempting to mimic real traffic behaviour.

In other words, having excess bandwidth may win today’s battles, but not tomorrow’s.

2. Geo-blocking

NetRegistry engineers had responded to the attack aimed at AFACT using a technique called “geo-blocking”.

The engineers identified that malicious traffic was predominantly coming from Chile and Columbia. With less than one percent of traffic coming from these counties on a given day, compared to say the US, NetRegistry opted to block all traffic from these countries.

“Network engineers simply have to make a series of decisions to minimise collateral damage,” Bloch said.

But Prolexic’s Burns believes that on this occasion, the web host got lucky.

“This tool may work for some businesses, but Prolexic believes that limiting any business from receiving requests from an entire region is unnecessary and is – in some way – admitting defeat,” he said.

Had the attack on AFACT been launched from the US, Europe or Asia, it is unlikely NetRegistry could have relied on blocking an entire nation’s incoming traffic.

Cases in point were two recent attacks on wholesale IP network provider Vocus Communications.

In March, an attack against web hosting firm Web24 took down part of Vocus’ network and was believed to have come from Asia, Russia and the United States.

In May, the firm suffered a second DDoS attack that was part of a wider attack on US servers.

By July, the company opted to outsource its DDoS protection to a third party, ending its reliance on network technicians to write scripts to manually detect and block malicious traffic.

3. Hide behind giants

The development of cloud computing platforms has introduced a variety of new options to provide resilience against a DDoS attack.

Some companies have migrated part of their infrastructure to distributed computing platforms such as content delivery networks Limelight or Akamai.

“Those are cheaper than buying more bandwidth, but it’s [still] not cheap,” said Nazario.

For those without deep pockets – such as small business and even government agencies – one strategy to beat DDoS has been to rely on the larger infrastructure sets of social network giants such as Google or Facebook.

These sites enable an organisation to continue to communicate with the world, at the cost of functionality and control.

“We have seen people do it on the cheap for themselves – such as a Georgian blogger that was moving stuff into Facebook and Google… basically piggy-backing on those providers’ massive infrastructure to absorb the hit,” said Nazario.

Desperate times called for a commensurate response by the Georgian Government, which turned to Google’s Blogger service to maintain outbound communications with Western nations while under a Russian cyber attack during their 2008 war.

But even the infrastructure of Google or Facebook – whilst larger and more sophisticated – isn’t immune to attack.

“It hasthe potential for collateral damage because now people are attacking large infrastructure and if there is a significant attack it will disrupt a lot of people around the world,” warns Nazario.

4. The reverse proxy

Australian web host Bulletproof Networks recently deployed a similar albeit more sophisticated cloud-based response by hiving off attack traffic to Amazon’s EC2 cloud.

Responding to a sustained DDoS attack aimed at broadband forum Whirlpool, Bulletproof had attempted to mitigate the attack by blocking individual IP addresses.

The web host had asked its upstream providers Internode and Pacific Internet to block incoming HTTP traffic from several IP addresses in the United States and Denmark, but within minutes the attack source shifted.

Nazario argues that the process of identifying individual sources is too labour-intensive.

“You need a highly trained human being to go over logs and packet traces to identify those malicious clients. It can take an hour or two or 24 hours, depending,” he said.

Within a few days, Bulletproof found a better solution. It deployed a “reverse proxy” server in Amazon’s EC2 cloud which it used to bear the load of malicious HTTP traffic.

Amazon’s EC2 served up cached elements of Whirlpool, while legitimate traffic was served non-cached pages from Bulletproof’s Australian-hosted web servers.

5. Choose your neighbours carefully

Given the recent attack on AFACT, businesses might wonder whether it is possible to avoid fallout by refusing to share hosting infrastructure with a likely target.

That is assuming, of course, that a host would even tell you what other organisations share the same platform.

Bloch said it would not make sense from the host’s perspective.

“It is impossible for a sales person or automatic web sign-up tool to do a risk assessment on every customer request,” he said.

“Your question could just as well be: Are you in a shared box with someone with a successful marketing campaign?

“Every now and then somebody sets up a mini-site on a $10 a month hosting account, spends a million on television advertising and expects to cope with the demand on a shared service hosted on a single box.”

Conclusion: Weighing up the cost

IBRS analyst James Turner said that often the right questions are not asked in advance because the risk of a DDoS attack appears low while the cost of mitigation is high.

“For some organisations, it just won’t be worth the cost of mitigating,” he said. “But for others, it would be a crippling incident.

“This is classic risk analysis. If you are offline for an hour, how much money are you not making, or losing?”

As revealed in a recent iTnews poll [see right] – four in five readers feel there is no excuse for data breaches during a DDoS attack. This assumes that organisations have adequate defences in place.

In percentage terms, it remains highly unlikely that a legitimate business will be attacked, with the bulk of attacks launched against home users and small sites after disputes in online games or forums.

But should an organisation find itself a target, “proportionally it’s much more expensive to defend against a botnet attack than it is to execute one,” Turner said. “It’s inexpensive to set up a botnet, and an attacker can wreak a lot of damage.

“For organisations that are at risk of a botnet attack – potentially any online service from government to e-commerce – they need to understand the impact on their organisation of their customers losing access to their website.”

Brett Winterford contributed to this story.

Source: http://www.itnews.com.au/News/234834,five-ways-to-defend-against-a-ddos-attack.aspx

Commission proposes new EU cybercrime law

The European Commission wants to harmonise the laws of EU member states dealing with cyber-attacks. It wants to create a new Directive on attacks on information systems, it said in a statement.

The European Commission adopted a ‘framework decision’ in 2005 that attempted to coordinate laws across Europe on hacking, viruses and denial of service attacks.

<a href=”http://ad.uk.doubleclick.net/jump/reg.public_sector.4159/government;tile=2;pos=top;dcove=d;sz=336×280;ord=TLNJYcCoAT8AAHn52oMAAARn?” target=”_blank”><img src=”http://ad.uk.doubleclick.net/ad/reg.public_sector.4159/government;tile=2;pos=top;dcove=d;sz=336×280;ord=TLNJYcCoAT8AAHn52oMAAARn?” alt=””></a>

It has now said that an increase in the sophistication of these attacks and a change in the legal structure of the EU following the passing of the Lisbon Treaty means that that framework decision should be replaced by a Directive.

“[The framework decision] currently in force was a first step towards addressing the issue of attacks against IT systems. Technological advances and new methods employed by perpetrators call for an improvement of EU rules,” said a Commission statement.

“In addition, the entry into force of the Lisbon Treaty on 1 December 2009 provides considerable advantages for new legislation to be adopted in the field of Justice and Home Affairs from now on,” it said. “Legislation will no longer need to be approved unanimously by the EU Council of Minsters (which represents national governments). Instead, it will be adopted by a majority of Member States at the Council together with the European Parliament. A single country will not be able to block a proposal.”

Cyber-attackers are increasingly using massed ranks of hijacked computers, called botnets, to conduct attacks. Groups opposed to anti-piracy legislation and enforcement, for example, are thought to be behind recent denial of service attacks on various legal and institutional websites that are likely to have used botnets.

The Commission said that it wanted to create a new Directive so that it could ensure that laws in all of the EU member states were adequate to deal with what it said were increasingly dangerous threats.

“Implementation at national level will … be improved,” it said. “The Commission will now be able to monitor how Member States apply EU legislation. If it finds that EU countries violate the rules, it will be in a position to refer the case to the European Court of Justice. These considerations add to the justification for the new proposed Directive.”

Like the framework decision, the planned Directive will outlaw gaining illegal access to systems; and interference with systems and data. In addition it will penalise the use of botnets and other ‘tools’ for those purposes; and make police forces respond faster to problems and collect more data on cyber offences.

The Directive would also increase the penalties for those found guilty of offences under it.

“The proposed Directive raises the level of criminal penalties to a maximum term of imprisonment of at least two years. Instigation, aiding, abetting and attempt of those offences will become penalised as well,” said the statement. “Once adopted, the Directive raises the level of criminal penalties of offences committed under aggravating circumstances to a maximum term of imprisonment of at least five years (instead of two years, as foreseen by [the framework decision]).

Those aggravating circumstances would be that the offences were committed by someone acting as part of a criminal organisation; by someone using a tool such as a botnet; or by someone concealing their own identity or using someone else’s.

The Commission said that the plan was a response to the increasing severity of attacks.

“The number of attacks against information systems has increased significantly in the last few years and a number of attacks of previously unknown large and dangerous scale have been observed, such as those in Estonia and Lithuania in 2007 and 2008 respectively. In March 2009, computer systems of government and private organisations of 103 countries (including a number of Member States, such as Cyprus, Germany, Latvia, Malta, Portugal and Romania) were attacked by malware installed to extract sensitive and classified documents,” it said.

<a href=”http://ad.uk.doubleclick.net/jump/reg.public_sector.4159/government;tile=2;pos=top;dcove=d;sz=336×280;ord=TLNJY8CoAT8AAHjj1j8AAAOw?” target=”_blank”><img src=”http://ad.uk.doubleclick.net/ad/reg.public_sector.4159/government;tile=2;pos=top;dcove=d;sz=336×280;ord=TLNJY8CoAT8AAHjj1j8AAAOw?” alt=””></a>

“More recently the world witnessed the spread of a botnet called ‘Conficker’ (also known as Downup, Downadup and Kido), which has propagated and acted in an unprecedented scale and scope since November 2008, affecting millions of computers worldwide. Inside the EU, damages from this botnet were reported in France, the UK and Germany. French fighter planes were unable to take off after military computers were infected by Conficker in January 2009,” it said.

Source: http://www.theregister.co.uk/2010/10/11/eu_new_cybercrime_law/