DDoS attacks now coming from mobile apps, Prolexic report says
Hackers are now using mobile apps to launch distributed denial
of service (DDoS) attacks against enterprise clients, according to a new
report from Prolexic Technologies Inc., a security solutions provider focused on protecting against DDoS attacks.
In the fourth quarter of 2013, a team of security engineers at
Prolexic uncovered a case where hackers were targeting a major, unnamed
financial services firm located in Asia using AnDOSid, an Android
operating system app. (Image: Prolexic). AnDOSid app for Android.
The app launched a HTTP POST flood attack, where the number of HTTP
requests becomes so huge, a victim’s server has trouble responding to
them all. When the server begins to rely too heavily on its system
resources, it crashes.
While Prolexic’s report highlighted this specific case, it also noted
this won’t be the last we’ll see of mobile app-enabled DDoS attacks.
It’s simple enough to download an app that will perform a DDoS attack
from an online app store, and any aspiring hacker would be able to use
it, without having any experience in mounting cyber attacks, researchers
wrote.
When the RMS Titanic set sail on her maiden
voyage from Southampton, England, to New York, on April 10, 1912, she
was considered the ultimate passenger liner -- unparalleled in luxury,
size and
In the attack on the financial services firm, the attackers used at
least 12 unique attacks, one of which had a hacktivist message to
recruit others to help them. That means many of the people involved were
volunteers who purposely connected to the command and control server
and joined the botnet. The hackers were then able to control their
devices remotely and kickstart the attack. (Image: Prolexic). Hacktivist message appearing in a DDoS campaign.
“The prevalence of mobile devices and the widespread availability of
downloadable apps that can be used for DDoS is a game changer,” said
Prolexic president Stuart Scholly in a statement.
“Malicious actors now carry a powerful attack tool in the palm of
their hands, which requires minimal skill to use. Because it is so easy
for mobile device users to opt-in to DDoS attack campaigns, we expect to
see a considerable increase in the use of these attack tools in 2014.”
Part of the reason is that it’s easier to launch an attack using a
mobile device is because the apps involved, like AnDOSid, have an
easy-to-use interface. While AnDOSid was originally designed for
security professionals to test their own sites for vulnerabilities, the
attackers leveraged it for this particular attack campaign against the
financial services firm because it provides simple instructions like
“Go” and “Stop” – perfect for directing volunteers. (Image: Prolexic). Low Orbit Ion Cannon, an Android app.
And AnDOSid isn’t the only tool. Prolexic researchers also found a
new app called Low Orbit Ion Cannon, also used to participate in the
same attack campaign on the financial services firm. The app was
available in the Google Play store in December 2013.
“Mobile devices add another layer of complexity. Because mobile
networks use super proxies, you cannot simply use a hardware appliance
to block source IP addresses as it will also block legitimate traffic,”
Scholly said.
“Effective DDoS mitigation requires an additional level of
fingerprinting and human expertise so specific blocking signatures can
be developed on-the-fly and applied in real-time.”
Beyond adding mobile apps to hackers’ weapons arsenal, Prolexic
researchers also noted between 2012 and 2013, they were seeing more
sophisticated attacks reaching a greater number of targets. About a
fifth of these attacks came from the U.S., the biggest source of DDoS
attacks, followed by China, Thailand, the U.K., and South Korea.
Seeing an attack campaign staged by multiple mobile device owners
running at least 12 attacks is something we should expect to see more
often, Prolexic’s team said in their report, writing this particular
case was a “prime example of DDoS attacks today.”
“No longer are they simple attacks, but instead they take a scatter
shot approach, seeking to find any weakness with which to take down a
website in a number of ways,” the report said.
Researchers noted they expect China to eclipse the U.S. as a source
of DDoS attacks in the coming years, as it has a large Internet
population and a foreign policy that encourages government employees to
use the Internet to their country’s advantage.
No comments:
Post a Comment