The now famous and most hated hackers in the world, the Lizard Squad, have struck again. Most people familiar with cyber attacks and hacking have heard about the Lizard Squad and that they are known for DDoS attacks. They hacked and defaced Google Vietnam’s home page.
The attack started and many Internet users in Vietnam were unable to get access to google.com.vn. The defaced screen showed an image of a teenager holding an iPhone and a video along with a tweet from Lizard Squad. Another tweet from Lizard Squad further confirmed their likely hand in the hacking and defacement. However, surprisinglym the official Twitter account of Lizard Squad was silent about the hacking.Read more
File integrity monitoring, patching, key defence. Criminals are ransoming database backups, after compromising web applications to change databases' encryption settings. Security consultancy claimed the attacks start with an attack on a web site that yeilds acess to a database server.
Once in, attackers change the encryption settings used by the database and store the key on an HTTPS server somewhere, an operation that apparently escapes some admins' attention. To pull off the attack, the attackers remove the key from the remote server, at which point the website operator notices their site is down.Read more
Botnets first came into the consciousness of most of the general public in early 2000 when a Canadian teenager launched a series of distributed denial-of-service attacks against several high-profile Web sites.
The teen, who used the handle Mafiaboy, targeted Yahoo, ETrade, Dell, eBay, Amazon and other sites over the course of several days, flooding the sites with massive amounts of junk traffic until their servers crashed. Although Mafiaboy didn’t use a botnet to launch his attacks, security experts warned in the aftermath of the episode that botnets – large networks of PCs infected with a specific kind of malware – and the DDoS attacks they’re used for.Read more
Crashing websites and overwhelming data centers, a new generation of cyber attacks is costing millions and straining the structure of the Internet. While some attackers are diehard activists, criminal gangs or nation states looking for a covert way to hit enemies, others are just teenage hackers looking for kicks.
Distributed Denial of Service attacks have always been among the most common on the Internet, using hijacked and virus-infected computers to target websites until they can no longer cope with the scale of data requested, but recent weeks have seen a string of particularly serious attacks. Many attacks, however, appear to be homegrown.Read more
The cyber-assaults disabling Sony PlayStation and Microsoft's Xbox game consoles may have been done by hackers 'for laughs' - but is something more sinister going on?
Every week, Ann and Jim Johnson put away a few pounds in their Christmas club. Their younger daughter got a doll’s house, their middle son a bike. But their oldest, Jamie, got a Sony PlayStation 4 – followed by several hours of anguished, then tearful, failure to make it work properly. He wanted to play with his friends and he couldn’t. It was the second disastrous cyberassault on Sony in a month.Read more
A group, which claimed to have affiliation with Anonymous, released a file after hacking some combinations of passwords and usernames. The information is said to be used in a number of sites.
Other types of data that were compromised include the users' credit card numbers and card expiration dates. The file also included the accounts of several dating and porn sites. News of the hack came just a day following the network connection failure with Sony's PlayStation and Microsoft's Xbox Live. The hacker group Lizard Squad claimed to be responsible for the attacks on gaming platforms.Read more
Seventy-six percent of organizations in the USA and United Kingdom have suffered a DNS attack, according to Cloudmark. Three hundred IT decision makers were polled across the USA and UK and, of those who reported suffering a DNS attack, more than half admitted to losing business critical data or revenue.
An astounding third of respondents also confirmed they had lost confidential customer information. The survey findings suggest that large organisations are not only inadequately protecting company intellectual property against DNS attacks but more needs to be done to help educate businesses on the methods used by DNS attackers.Read more
Police have arrested a former executive at conservative media group Intereconomía and three computer experts for launching online attacks against the Spanish public relations news website, PR Noticias.
Luis Sans is alleged to have hired hackers to launch distributed denial of service attacks on a media industry news site which went down for three weeks as the result of the coordinated action and lost an estimated €425,000 as a result. A 14-month investigation led to the arrests in the provinces of Madrid and Tarragona. Eventually, the probe uncovered evidence that a Spanish businessman may have been behind the attack.Read more
Municipal websites in Fort Lauderdale, Florida suffered a distributed denial of service attack after Anonymous promised to disrupt the city's activities following the passing of local laws outlawing the feeding of homeless people.
The attack occurred on Monday afternoon and led to massive congestion of the websites of the city and its police force, as well as the email system used by local government. The city authorities shut them down as a precautionary measure. The previous day a group claiming to be affiliated with Anonymous threatened action against the Fort Lauderdale authorities in a video.Read more
Research suggests that more than 81% of Tor clients can be ‘de-anonymised’ their originating IP addresses revealed – by exploiting the technology that is built into its router protocols, and similar traffic analysis software running by default in the hardware of other manufacturers.
The technique involves introducing disturbances in the highly-regulated environs of Onion Router protocols using a modified public Tor server running on Linux. His work on large-scale traffic analysis attacks in the Tor environment has convinced that a well-resourced organisation could achieve an extremely high capacity to de-anonymise Tor traffic.Read more