Wednesday, April 6, 2011

Anonymous DDoS Targets Egyptian Government Sites

Anonymous DDoS Targets Egyptian Government Sites


Wednesday, January 26, 2011



Headlines

69dafe8b58066478aea48f3d0f384820

Related: Anonymous DDoS Participants Arrested in UK

UPDATE: Anonymous Calls UK Arrests a "Declaration of War"

UPDATE:  FBI Executes Warrants for Anonymous DDoS Attacks

The international script-kiddie ensemble known as Anonymous has turned their distributed denial of service (DDoS) attacks on Egyptian government websites.

Analysis from NetCraft shows server failure for Egypt's Ministry of the Interior (MOI) website, and other reports indicate that the Egyptian Ministry of Communications and Information Technology may also have been targeted.

An Anonymous press release board called AnonNews has the following recruitment banner posted that directs participants to the IRC chat room used to coordinate the attack, along with other instructions:

Attachment

Anonymous had previously targeted the websites of PayPal, Visa, MasterCard, PostFinance Bank and others who had halted business relations with WikiLeaks, spoke out against the group's data releases, or had refused to process donations to the group.

Anonymous has also recently attacked government websites Zimbabwe and Tunisia, as well as making a failed attempt to take down the Bank of America website.

The Tunisian DDoS attacks resulted in a widespread government crackdown against local activists and bloggers.

The downloadable DDoS tool distributed by Anonymous called the Low Orbit Ion Cannon (LOIC) left attack participants vulnerable to identification by authorities.

The flaw in the LOIC tool may have resulted in arrests in Holland and the seizure of servers in Dallas, Texas that were used in some of the DDoS attacks.

Developers associated with Anonymous were reported to be working to correct deficiencies in the LOIC code which left participants open to identification by authorities.

A hacktivist known only as The Jester (th3j35t3r) confirmed in mid-January rumors that he had "infected" the latest version of the tool by making alterations to the DHN.zip file circulating on the web.

Alterations to the new version apparently reveal paths, usernames, IP addresses, MAC, and system information that can be used by authorities to identify attackers.

Regardless of the risk of legal repercussions to unwitting participants in the Anonymous DDoS attacks, which are typically teenagers and young adults, active recruitment for the campaigns continues.

https://infosecisland.com/blogview/11383-Anonymous-DDoS-Targets-Egyptian-Gove...

Posted via email from Whistleblower

No comments:

Post a Comment