{"id":1044560,"date":"2012-02-28T13:59:46","date_gmt":"2012-02-28T13:59:46","guid":{"rendered":"http:\/\/www.immortalitymedicine.tv\/uncategorized\/anatomy-of-an-anonymous-attack-laid-bare-by-imperva.php"},"modified":"2024-08-17T17:14:26","modified_gmt":"2024-08-17T21:14:26","slug":"anatomy-of-an-anonymous-attack-laid-bare-by-imperva-2","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/anatomy\/anatomy-of-an-anonymous-attack-laid-bare-by-imperva-2.php","title":{"rendered":"&#39;Anatomy of an Anonymous Attack&#39; laid bare by Imperva"},"content":{"rendered":"<p><p>    Security firm Imperva has published a detailed analysis of an    attack by Anonymous on one of its customers, providing new    insight into how the hacktivist group operates, and    highlighting the need for better application layer security.  <\/p>\n<p>    According to The New York Times, the target in    question was the Vatican, although Imperva has declined to    confirm the identity of the organisation.  <\/p>\n<p>    The attack, which did not adversely affect the site or    compromise any user data, consisted of three distinct phases:  <\/p>\n<p>            Related Articles on Techworld            The first, described as \u201crecruitment and communication\u201d    involved drumming up support using social media sites such as    Facebook, Twitter and YouTube, to suggest and justify an    attack.        The second, dubbed \u201creconnaissance and application layer    attacks,\u201d involved a small number of professional hackers,    using common vulnerability assessment tools to probe for    security holes and launch application attacks, like SQL    injection, to attempt to steal data from the targets.        When these data breach attempts failed, the skilled hackers    elicited help from so-called \u201claypeople\u201d to carry out a    distributed denial of service (DDoS) attack.        <\/p>\n<p>    According to Amichai Shulman, co-founder and CTO of Imperva,    the attack by Anonymous mimics the approach used by for-profit    hackers. The group of 10 to 15 professional hackers used    off-the-shelf tools such as Havij, Acunetix and Nikto to check    for vulnerabilities and attempt     SQL injection attacks.  <\/p>\n<p>    Shulman said it was clear that these were professional hackers,    as they had knowledge of the hacking tools and also took care    to disguise their identities using anonymity services.  <\/p>\n<p>    When the hackers failed to find any vulnerabilities, the DDoS    attack was carried out using a custom-built tool that allows    users to attack sites with mobile browsers. Unlike more    traditional network layer DDoS attacks, this targeted the    application layer, with the aim of eating up server resources.  <\/p>\n<p>    Anonymous created a web page containing a Javascript that    iterates endlessly, as long as the page is open in the browser.    This type of attack is commonly referred to as Mobile LOIC (low    orbit ion cannon). All it took for a layperson to participate    in the attack was for them to browse to the specific web page    and leave it open.  <\/p>\n<p>    Shulman said that if an organisation\u2019s threat landscape    includes Anonymous, then it should install application layer    security as well as DDoS protection, because that had been the    hackers' first choice. However, the real motivation for    implementing this kind of security should be financial    protection.  <\/p>\n<p>    \u201cIf you look at what Anonymous has done in the past couple of    years, it has been more of a nuisance than anything else,\u201d he    said. \u201cHowever, Anonymous are using the same tools that    financially-motivated criminal hackers are using, and this is    what organisations should be worried about.\u201d  <\/p>\n<p>    Imperva constantly monitors some 40 customer applications, and    Shulman claims that an application attack is launched once    every two or three minutes. \u201cThis is a far greater threat than    Anonymous hacking a website to make a political point,\u201d he    said.  <\/p>\n<p>    Shulman added that, while most of Anonymous's attacks have    targeted fairly small organisations using LOIC or Mobile LOIC    attacks, occasionally the group launches a massive attack    against an internet giant like American Express or     the FBI.  <\/p>\n<p>    \u201cIn     Operation Payback they were using botnets,\u201d said Shulman.    \u201cThis kind of operation cannot be volunteer-based. It requires    a very different tools. It requires horsepower, funding and    planning. So who is behind it? And why are they taking the    trouble to do it? That is still a mystery.\u201d  <\/p>\n<p>    He said that financial hackers are also increasingly launching    SQL injection attacks using botnets, which is a much larger    scale of problem, because it allows attackers to scale up much    faster.  <\/p>\n<p>    Imperva compiled the \u201cAnatomy of an Anonymous Attack\u201d report    based on data from its Application Defense Center (ADC). A copy    of the report can be downloaded here.  <\/p>\n<\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/rss.feedsportal.com\/c\/270\/f\/470440\/s\/1cfe57f4\/l\/0Lnews0Btechworld0N0Csecurity0C3340A5230Canatomy0Eof0Eanonymous0Eattack0Elaid0Ebare0Eby0Eimperva0C0Dolo0Frss\/story01.htm\" title=\"&#39;Anatomy of an Anonymous Attack&#39; laid bare by Imperva\" rel=\"noopener\">&#39;Anatomy of an Anonymous Attack&#39; laid bare by Imperva<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Security firm Imperva has published a detailed analysis of an attack by Anonymous on one of its customers, providing new insight into how the hacktivist group operates, and highlighting the need for better application layer security. According to The New York Times, the target in question was the Vatican, although Imperva has declined to confirm the identity of the organisation <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/anatomy\/anatomy-of-an-anonymous-attack-laid-bare-by-imperva-2.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[577281],"tags":[],"class_list":["post-1044560","post","type-post","status-publish","format-standard","hentry","category-anatomy"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1044560"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=1044560"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1044560\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=1044560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=1044560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=1044560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}