Thanks for the link!  We've been hit with a couple of those ourselves.  They've 
been short in duration, but shutting down a poison control center does not help 
an already stressful work situation.

--
richard

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Kurt Buff
Sent: Tuesday, June 04, 2013 12:00 AM
To: Kurt Buff
Subject: [NTSysADM] TDoS - your new term for the day

http://www.darkreading.com/attacks-breaches/hacking-the-tdos-attack/240155809

By Kelly Jackson Higgins
Dark Reading
May 30, 2013

When an ICU nurse refused to pay scammers who insisted she owed money for a 
payday loan, they unleashed a robo-dial flood of hundreds of calls per hour 
that ultimately shut down the phone system of the hospital's intensive care 
unit. In another case, supporters of a popular company that received a negative 
rating from a major financial firm voiced their displeasure by crowdsourcing 
phone calls to the firm in an attempt to block its trading and other functions 
-- and they organized it via a Facebook Event post.

These real-world cases of telephony denial-of-service (TDoS) attacks in the 
past year didn't get the publicity that distributed denial-of-service (DDoS) 
attacks did, but security experts say these types of attacks have been on the 
rise in the past couple of years and can be just as damaging as a DDoS.

"Personally, I believe that it's a more invasive approach to target a company's 
[or] individual's primary means of communication. Just like DDoS attacks, based 
on my observations, they tend to abuse the infrastructure of legitimate 
services, Skype, ICQ, major U.S-based carriers, and relevant SIP providers," 
cybercrime researcher Dancho Danchev said in an interview via email.

TDoS attacks -- which earlier this year were becoming prevalent enough that the 
U.S. Department of Homeland Security issued an alert about a threat of TDoS 
attacks on public sector entities in an attempt to extort money -- are 
typically similar in motivation and goals as DDoS attacks that flood networks, 
websites or other servers with massive volumes of traffic meant to bring an 
organization's data structure to its knees. Call centers are the most popular 
TDoS targets -- they're easy to contact and flood with calls -- and, 
increasingly, there are more tools readily available tools for launching these 
attacks on any organization or individual's location.

[...]




The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and is 
intended only for use by the addressee(s) named herein and may contain legally 
privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof.

Reply via email to