More details are surfacing about a massive denial-of-service (DDOS) attack that has hit both government and commercial websites in the US and South Korea in the past few days.

According to security researchers, the attacks are the work of malware that infected users and routed traffic to government and commercial sites starting during the US 4 July holiday weekend.

Just what that Trojan is exactly is the subject of some disagreement, with some researchers contending the malware is an updated version of the infamous MyDoom worm that plagued Windows users in 2004. However, connections between MyDoom and the malware involved in the attack may be overplayed, according to Joe Stewart, director of malware research for SecureWorks’ Counter Threat Unit.

“It’s definitely not an updated version of MyDoom,” he said in an interview. “I’m not really seeing all that many similarities… most of the code seems to be unique.”

Stewart could not say how the malware is being spread. But what is clear is the attack is even broader than initially reported. On 5 July, the list of sites to be attacked included only five US government sites. By the following day, however, that featured 21 sites, including some in the private sector. On the 7 July, the list was updated again and had 26 sites, including some in South Korea.

Among the sites hit by the attack were the US Department of Treasury, the White House, the Federal Trade Commission and the Washington Post. Some of the organisations are reported to have fended off the attacks.

At the moment, the motives of the attackers remain unclear. No data was stolen, and it appears that the only impact was the takedown of some high-profile sites. But the impact may have a political motivation.

“I am a little suspicious over the timing of this attack,” said Rick Howard, the director of iDefense Security Intelligence. “We are still not clear about the purpose or motivation. The target list is somewhat unique in that iDefense has not seen these organisations lumped together like this in the past. As the Obama administration tries to come to grips with the new cyber-security policy, this event will be highlighted on the front of their radar screens. My question is this: who would most benefit from an attack like this now?”

Stewart speculated the attackers may have been after attention.

“Most of the DDOS botnets we see are written by people that are doing this for profit, and there doesn’t seem to be a profit motive for this one. It’s just sending a lot of traffic… to try and flood [the sites],” he said.

So far, Stewart said his analysis of the code has not found any conclusive proof about the origin of the attack.

“There’s a few strings here, there’s the word China, and then there’s the Korean language type that they are using in the web requests that they’re sending to the attacked site, but anybody can put that in there to throw you off the trail,” he said. “That doesn’t say anything to me conclusively at all.”

However, according to the Associated Press, South Korea’s National Intelligence Service told South Korean lawmakers on Tuesday that North Korea or its sympathisers were behind the attack. If so, it would not be the first time ‘hacktivism’ brought down government websites. Just last year, for example, attackers defaced Lithuanian government and commercial Websites with anti-Lithuanian rhetoric and a communist hammer and sickle symbol.

Among the South Korean websites affected were the presidential Blue House and the Defence Ministry, as well as some banking sites.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

11 hours ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

13 hours ago

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

15 hours ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

19 hours ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

21 hours ago