Hackers Exploit Fallout From Twitter DDOS Attack

The fallout from the distributed denial-of-service attack that hit several Web 2.0 sites on 6 Aug has taken a couple of twists and turns.

Besides knocking out Twitter for a time on the 6th, the attack triggered a response from the company that a day later disrupted service for some users. According to Twitter, its defensive measures blocked some Twitter clients from communicating with Twitter’s API, leaving them unable to tweet via SMS.

If that wasn’t enough, researchers at McAfee found attackers have begun leveraging interest in the situation to spread malware by using search engine optimisation techniques to lure users into clicking on search results leading to malicious sites.

All this because of an apparent act hacktivism targeting a pro-Georgian blogger named ‘Cyxymu.’

“It’s not surprising that political motivation is mentioned where major DDoS attacks are concerned, as many services now play key roles in politically charged events,” said Chris Boyd, director of research at FaceTime Security Labs. “However, it’s important not to get carried away with “The Reds under the bed” way of thinking – recent attacks on key USwebsites were blamed on everyone from Chinato North Korea, with no smoking bullet evidence that these attacks were ever officially sanctioned.”

What is known is that the attack hit Facebook, Twitter, YouTube, Fotki and LiveJournal. Researchers are still on the trail of whoever was behind it, but have determined the attack packets sent to the Web sites were requests to fetch pages hosted for the blogger, who reportedly had just recently blogged about the upcoming anniversary of the war between Russiaand Georgia.

Between this incident and the recent DDOS attacks targeting both public and commercial Web sites in the U.S.and South Korea, Web administrators are advised to take precautions to secure their own sites, said John Harrison, Group Product Manager at Symantec Security Response. For starters, admins should have spare IP addresses registered as well as the ability to swap them in for attacked IPs via DNS. They should also familiarise themselves with the capabilities of their Internet Service Provider (ISP) and have a monitoring system to provide an early warning.

“When under attack there are a variety of mitigation techniques, most are specific to the type of DDoS attack,” he said. “Use technologies, including firewalls and routers to block or redirect IP addresses and types of traffic. Involve others, the ISP and perhaps the ISPs of attacking clients. Web admins can add the additional IP addresses they have in reserve and move services off the attacked servers.”

There isn’t too much end-users can do, but they should steer clear of any sites affected by a DDOS while it’s going on.

“Computer users are also encouraged not to visit sites that are rumored to be under a DDoS attack for the sole purpose of seeing what happens,” he said. “This ‘rubbernecking’ type of activity, similar to that which happens when there is an accident on the freeway, only causes an increase in traffic to the site which will only delay access to the Web site even longer and prolong the attack.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Microsoft, OpenAI Sued By More Newspaper Publishers

Eight newspaper publishers in the US allege Microsoft and OpenAI used their millions of their…

18 mins ago

Binance’s Changpeng Zhao Sentenced To Four Months In Prison

US judge sentences Binance founder, Changpeng Zhao, to four months in prison for ignoring money…

3 hours ago

OpenAI Hit By Austrian Complaint Over ChatGPT ‘False Data’

Rights group argues ChatGPT tendency to generate false information on individuals violates GDPR data protection…

1 day ago

EU Designates Apple’s iPad OS As DMA ‘Gatekeeper’

European Commission says Apple's iPadOS is 'gatekeeper' due to large number of businesses 'locked in'…

1 day ago

Beating the Barbarians in the Cloud

As the cloud continues to be an essential asset for all businesses, developing and maintaining…

1 day ago

Austria Conference Calls For Controls On ‘Killer Robots’

Internatinal conference in Vienna calls for controls on AI-powered autonomous weapons to ensure humans remain…

1 day ago