IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines
Auerbach Publications

Home

IT Performance Improvement

Management

Security

Networking and Telecommunications

Software Engineering

Project Management

Database


Free Subscription to IT Today





Powered by VerticalResponse


Share This Article

 
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks by Kenneth Brancik, $94.95
Information Security Governance Simplified: From the Boardroom to the Keyboard by Todd Fitzgerald, ISBN 9781439811634, $79.95
Cyber Fraud: Tactics, Techniques and Procedures by Rick Howard, $79.95
Data Mining for Intelligence, Fraud and Criminal Detection: Advanced Analytics and Information Sharing Technologies by Christopher Westphal, $79.95
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World by Stephen Fried, ISBN 9781439820162, $69.95
Practical Risk Management for the CIO by Mark Scherling, ISBN 9781439856536, $79.95
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement by W. Krag Brotby, ISBN 9781420052855, $79.95

Analysis of ĎAnonymousí Attack Techniques
Report reveals details on methods employed by hacktivist group to attack high-profile organizations

February 27, 2011 - Imperva, Inc. released today a report that reveals details on an attack by hacktivist group ĎAnonymousí against a high-profile unnamed target during a 25-day period in 2011. The Hacker Intelligence Summary Report: The Anatomy of an Anonymous Attack offers a comprehensive analysis of the attack, including a detailed timeline of activities from start to finish, an examination of the hacking methods utilized and insights on the use of social media to recruit participants and coordinate the attack.

"Our research shows that Anonymous generally mimics the approach used by for-profit hackers, leveraging widely known methods — SQL injection and DDoS — to carry out their attack. We found that Anonymous, although it has developed some custom attack tools, generally uses inexpensive, off-the-shelf tools as opposed to developing complex attacks," said Amichai Shulman, Co-Founder and CTO of Imperva. "Our research further shows that Anonymous will try to steal data first and, if that fails, attempt a DDoS attack." Highlights from the study of the Anonymous attack include:

The attack was made up of three distinct phases: recruitment and communication, reconnaissance and application layer attacks and, finally, a distributed denial of service (DDoS) attack.

  • Social media channels, especially Twitter, Facebook and YouTube, were the predominant means for suggesting a target and justifying the attack, as well as recruiting volunteers to participate in the hacking campaign, during the first recruitment and communication phase.
  • Sophisticated hackers made up only a small portion of the volunteers and were primarily active during the reconnaissance and application attack phase, tasked with probing for vulnerabilities and waging application attacks like SQL injection to attempt to steal data from the targets.
  • Laypeople were leveraged only in the third phase — to help carry out a DDoS attack — because the attempt to steal data through application attacks failed.
  • Anonymous has developed some custom attack tools — specifically the low orbit ion cannon (LOIC) and a tool to enable the launch of a DDoS attack from mobile browsers. However, the group also relies on widely available tools for finding and exploiting web application vulnerabilities during the reconnaissance and application attack phase.
  • Unlike for profit hackers, Anonymous rarely relies on common hacking techniques such as botnets, malware, phishing or spear phishing.

"Impervaís Application Defense Center (ADC) was able to witness and report on an Anonymous attack from start to finish," continued Shulman. "The analysis of this attack provides useful insight into how Anonymous recruits participants and wages an attack. We believe these details will help organizations prepare for and respond to a potential attack, as well as offer the greater security community a deeper understanding of how hacktivists operate."

Online Resources

.

Download a copy of The Hacker Intelligence Summary Report: The Anatomy of an Anonymous Attack.

Download an illustrative infographic outlining the attack.

Register to watch a webinar on Wednesday, March 21, 2012 2:00 pm EDT detailing the Anonymous attack.


© Copyright 2012 Auerbach Publications