http://nationalcybersecurity.com/?p=42439

 


WikiLeaks supporters strike back online
<http://nationalcybersecurity.com/?p=42439> 


News Room <http://nationalcybersecurity.com/?author=2>  | December 8, 2010 |
Comments (0) <http://nationalcybersecurity.com/?p=42439#comments>  

Chris Lefkow

WASHINGTON, Wednesday 8 December 2010 (AFP) - The website of the Swedish
prosecutor's office pursuing WikiLeaks founder Julian Assange came under
cyber attack on Tuesday in the latest salvo in a campaign by online
supporters who have also struck PayPal and the Swiss Post Office bank.

PandaLabs, the malware detection laboratory for computer security firm Panda
Security, said the prosecutor's website, aklagare.se, was brought down by
members of the loose "cyber hacktivist" group called "Anonymous."

The attack on the Swedish prosecutor's website came as Assange, whose
release of secret US diplomatic cables has sparked an international furor,
was refused bail by a British judge over allegations of sex crimes in
Sweden.

Sean-Paul Correll, a threat researcher at PandaLabs, said Anonymous had
dubbed the attacks on the websites of the Swedish prosecutor's office,
PayPal and the Swiss Post Office bank as "Operation Avenge Assange."

He said they were part of a battle being waged online between supporters and
opponents of WikiLeaks, whose website has come under repeated cyber attack
itself and has seen US companies gradually withdrawing their support.

"We have two sides of this attack spectrum," the PandaLabs researcher told
AFP in a telephone interview.

"We have the Anonymous guys on one side fighting for freedom of information
and freedom of press," Correll said. "And we have other people who consider
themselves patriots who are trying to defend the greater interests of the
United States."

Asked if he believed there was US government involvement behind the cyber
attacks on the WikiLeaks website, Correll said "it's tough to say."

"It would just be speculation because no one has come forward to say that
there is some type of involvement," he said.

He noted that an early attack on the WikiLeaks website had been claimed by a
known hacker who calls himself the "Jester." "The Jester doesn't necessarily
have to be one person," he said. "It could be a group of people, of
patriots."

WikiLeaks has been under cyber attack since Assange began releasing the
first US documents last week, forcing it to repeatedly change addresses and
Web hosts.

Amazon dropped WikiLeaks from its servers last week and PayPal blocked
financial transfers to the site while the Swiss Post Office bank on Monday
closed accounts held by Assange, the Australian-born WikiLeaks founder.

PayPal's official blog, ThePayPalBlog.com, came under distributed denial of
service, or DDoS, attack on Saturday and was down for at least eight hours,
PandaLab's Correll said.

He said that as of 6:00 pm (2300 GMT) on Tuesday, the Swiss Post Office bank
site had been down for more than 20 hours.

"Someone actually posted on Twitter and asked the attackers to stop their
attacks so they can conduct their banking," Carroll said.

In a classic DDoS attack, a "botnet" of zombie computers, machines infected
with viruses, are commanded to simultaneously visit a website, overwhelming
its servers, slowing service or knocking it offline completely.

Correll said the Swedish prosecutor's website was attacked by over 500
computers at the direction of Anonymous. "It literally went down the second
they announced the target," he said.

The PandaLabs researcher said Anonymous included anti-copyright activists
who took part in "Operation Payback," which began in September and involved
cyber attacks on the websites of the Motion Picture Association of America
(MPAA) and the Recording Industry Association of America (RIAA).

"This past weekend they decided they were going to fight against anybody
anti-WikiLeaks," said Correll, adding that he has been following Anonymous
"from Day One."

"Anonymous doesn't have a central authority, there's no hierarchical
structure," he said. "People describe it as having a kind of hive mind
mentality."

"They use social networks to recruit members and chat infrastructure," he
said, adding that "right now there's over 1,000 people in their chat room
participating in their attacks."

"These guys are very resourceful," Correll said, adding that he expects
their retaliatory activities to go beyond just DDoS attacks.

"I expect a laundry list of targets," he said. "They'll research security
vulnerabilities on a website. They've defaced websites in the past so I
expect to see all sorts of things coming in the future."

Article source: http://www.mysinchew.com/node/49165?tid=37

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to