Seventy-six percent of organizations in the USA and United Kingdom have suffered a DNS attack, according to Cloudmark. Three hundred IT decision makers were polled across the USA and UK and, of those who reported suffering a DNS attack, more than half admitted to losing business critical data or revenue.
An astounding third of respondents also confirmed they had lost confidential customer information. The survey findings suggest that large organisations are not only inadequately protecting company intellectual property against DNS attacks but more needs to be done to help educate businesses on the methods used by DNS attackers.
Read morePolice have arrested a former executive at conservative media group Intereconomía and three computer experts for launching online attacks against the Spanish public relations news website, PR Noticias.
Luis Sans is alleged to have hired hackers to launch distributed denial of service attacks on a media industry news site which went down for three weeks as the result of the coordinated action and lost an estimated €425,000 as a result. A 14-month investigation led to the arrests in the provinces of Madrid and Tarragona. Eventually, the probe uncovered evidence that a Spanish businessman may have been behind the attack.
Read moreMunicipal websites in Fort Lauderdale, Florida suffered a distributed denial of service attack after Anonymous promised to disrupt the city's activities following the passing of local laws outlawing the feeding of homeless people.
The attack occurred on Monday afternoon and led to massive congestion of the websites of the city and its police force, as well as the email system used by local government. The city authorities shut them down as a precautionary measure. The previous day a group claiming to be affiliated with Anonymous threatened action against the Fort Lauderdale authorities in a video.
Read moreResearch suggests that more than 81% of Tor clients can be ‘de-anonymised’ their originating IP addresses revealed – by exploiting the technology that is built into its router protocols, and similar traffic analysis software running by default in the hardware of other manufacturers.
The technique involves introducing disturbances in the highly-regulated environs of Onion Router protocols using a modified public Tor server running on Linux. His work on large-scale traffic analysis attacks in the Tor environment has convinced that a well-resourced organisation could achieve an extremely high capacity to de-anonymise Tor traffic.
Read moreShellShock, the remote code execution bug affecting GNU Bash, the command interpreter present on many Unix systems and Linux distributions, is still being exploited by attackers.
Experts warn about attackers leveraging a new version of the Bashlite malware, which was initially created as a DDoS bot with brute forcing capabilities and exploits the ShellShock bug. The malware now targets both computers and other devices running on BusyBox, located on the same network. The BusyBox software provides a number of Unix tools in a single executable file, and was specifically developed for embedded operating systems with limited resources.
Read moreCybercriminals have started a new trend for conducting distributed denial-of-service attacks and rely on a type of DNS amplification that leverages text records for making the operation more effective; in some campaigns, parts of a press release from the White House have been observed by researchers.
The tactic is not new, but more and more incidents of this sort have been recorded. The entertainment sector is the most targeted. Attackers have used large TXT records in reflection attacks in the past. Cybercriminals often use intermediate victims to reflect the bad traffic to their target.
Read moreThe well-known delivery services became popular among spammers. Spammers pretended to be such companies as DHL, FedEx, UPS and TNT. Hackers have more chances to achieve results, posing as well-known companies. A large amount of phishing emails were explored with the help of which attackers pretended to be famous international delivery service.
Making phishing attacks, spammers have two main goals: to get customer‘s information, both financial and personal data; or to infect the victim's PC with malware. If the download is succeed, such computers start spamming or become first step for organizing DDoS-attacks.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland