Showing posts with label DDoS. Show all posts
Showing posts with label DDoS. Show all posts

Friday, August 26, 2011

Leading Industry Analyst Firm Cites Prolexic in Recent Hype Cycle Report


 


Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) mitigation services, today announced that it has been mentioned as a sample vendor in a report entitled, “Hype Cycle for Infrastructure Protection, 2011” by respected industry analyst firm Gartner. In the August 10 report, Gartner predicts DDoS defense will achieve mainstream adoption in less than two years and lists it as “highly beneficial” on its Priority Matrix.

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) mitigation services, today announced that it has been mentioned as a sample vendor in a report entitled, “Hype Cycle for Infrastructure Protection, 2011” by respected industry analyst firmGartner.
In the August 10 report, Gartner predicts DDoS defense will achieve mainstream adoption in less than two years and lists it as “highly beneficial” on its Priority Matrix.
A DDoS attack is an attempt to make a computer resource (i.e. web site, e-mail, voice, or a whole network) unavailable to its intended users. By overwhelming a web site and/or server with data and/or requests, the target system either responds so slowly as to be unusable or crashes completely. The data volumes required to do this are typically achieved by a network of remotely controlled Zombie or botnet [robot network] computers.

"Gartner client calls on DDoS have increased and DDoS services are nearing "must-have" status. Any Internet-enabled application that requires guaranteed levels of availability should employ DDoS protection to meet those requirements."


According to Gartner Vice President and Research Fellow, John Pescatore, Gartner client calls on DDoS have increased and DDoS services are nearing "must-have" status. In the report, he states, “DDoS mitigation services should be a standard part of business continuity/disaster recovery planning and be included in all Internet service procurements when the business depends on the availability of Internet connectivity. Any Internet-enabled application that requires guaranteed levels of availability should employ DDoS protection to meet those requirements.” The report also lists 10 sample DDoS mitigation providers, including Prolexic.
“Because DDoS is all we do, we have more expertise, more experience and more network resources dedicated to fighting these attacks than any other provider,” said Scott Hammack, chief executive officer at Prolexic. “That’s why large, complex attacks that can overwhelm other providers always end at Prolexic.”
Since 2003, Prolexic has been protecting Internet facing infrastructures against all known types of DDoS attacks at the network, transport and application layers with a distributed global network of scrubbing centers. By dedicating more bandwidth to attack traffic than any other provider – supplemented by proprietary tools, techniques, and experienced security experts – Prolexic has been able to handle the largest and most sophisticated DDoS attacks ever launched.
Prolexic’s singular focus on DDoS mitigation also avoids potential conflicts of interest between business groups for companies that offer multiple service lines. This can occur when a DNS provider also offers “add on” DDoS mitigation services, for example. If the same infrastructure that supports DNS services is overwhelmed by a DDoS attack, it is possible that DDoS customers will be sacrificed to protect DNS customers and the company’s core business. Pure play DDoS mitigation providers like Prolexic do not have this concern.
“Five of the ten largest global banks, e-Commerce providers, payment processors and others with mission critical Internet-facing infrastructures trust Prolexic to protect them from DDoS attacks and restore availability in minutes,” said Hammack. “That’s why Prolexic is the gold standard for DDoS monitoring and mitigation.”
http://www.prweb.com/releases/2011/8/prweb8742612.htm

Monday, August 8, 2011

DIY Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls


LAS VEGAS — What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach?
Launch your personal, specially equipped WASP drone — short for Wireless Aerial Surveillance Platform — to fly overhead and sniff his Wi-Fi network, intercept his cellphone calls, or launch denial-of-service attacks with jamming signals.
These are just a few of the uses of the unmanned aerial vehicle that security researchers Mike Tassey and Richard Perkins demonstrated at the Black Hat security conference here Wednesday.
At a cost of about $6,000, the two converted a surplus FMQ-117B U.S. Army target drone into their personal remote-controlled spy plane, complete with Wi-Fi and hacking tools, such as an IMSI catcher and antenna to spoof a GSM cell tower and intercept calls. It also had a network-sniffing tool and a dictionary of 340 million words for brute-forcing network passwords.
The GSM hack was inspired by a talk given at last year’s DefCon hacker conference by Chris Paget, who showed how to create a cellphone base station that tricks nearby handsets into routing their outbound calls through it instead of through commercial cell towers.
That routing allows someone to intercept even encrypted calls in the clear. The device tricks phones into disabling encryption, and records call details and content before they’re routed to their intended receiver through voice-over-internet protocol or redirected to anywhere else the hacker wants to send them.



The drone takes that concept and gives it flight. The plane weighs 14 pounds and is 6 feet long. Per FAA regulations, it can legally fly only under 400 feet and within line of sight. But the height is sufficient to quiet any noise the drone might produce, which the researchers said is minimal, and still allow the plane to circle overhead unobtrusively.
It can be programmed with GPS coordinates and Google maps to fly a predetermined course, but requires remote control help to take off and land.
The two security researchers created the spy plane as a proof of concept to show what criminals, terrorists and others might also soon be using for their nefarious activities.
Tassey, a security consultant to Wall Street and the U.S. intelligence community, told the conference crowd that if the two of them could think up and build a personal spy drone, others were likely already thinking about it, too.
The spy drones have multiple uses, both good and bad. Hackers could use them to fly above corporations to steal intellectual property and other data from a network, as well as launch denial-of-service or man-in-the-middle attacks. They could also transmit a cellphone jamming signal to frustrate an enemy’s communications.
“It’s hard to keep something that’s flying from getting over your facility,” Tassey said.
A drone could also be used to single out a target, using the target’s cellphone to identify him in a crowd, and then follow his movements. And it would be handy for drug smuggling, or for terrorists to trigger a dirty bomb.
But the drones don’t just have malicious uses. The researchers point out that they would be great for providing emergency cellular access to regions hit by a disaster.
The drones could also be outfitted with infrared cameras and shape-recognition technology to run search-and-rescue missions for lost hikers. The military could use them for electronic countermeasures to jam enemy signals or as communication relays flown over remote areas to allow soldiers on two sides of a mountain, for example, to communicate.
“You don’t need a PhD from MIT to do this,” Perkins said.
http://www.wired.com/threatlevel/2011/08/blackhat-drone/

Tuesday, July 19, 2011

Media Moguls body discovered

http://media.smh.com.au/technology/tech-talk/murdochs-the--sun-hacked-2501674.html




Hackers who broke into the News Corporation network and forced its British websites offline claim to have stolen sensitive data from the company including emails and usernames/passwords.
All of News Corporation's British websites were taken offline today following an attack on the website of tabloid The Sun, which earlier today was redirecting to a fake story about Rupert Murdoch's death.
Further pain is expected for the media mogul as the hacker group responsible for the attack claims to have also stolen emails and passwords for News International executives and journalists. It said it would release more information tomorrow.

Hacked ... LulzSec put a fake story on The Sun's website saying Rupert Murdoch was dead. Hacked ... LulzSec put a fake story on The Sun's website saying Rupert Murdoch was dead. Photo: Screengrab
Websites for The Sun, The Times, BSkyB and News International were all inaccessible this morning.
It is believed News took the decision to pull the plug on its entire British network of sites following the hack attack on The Sun. This may have been to prevent further damage and stop unauthorised users from accessing private emails with the hacked login details.
The infamous hacking group LulzSec have claimed responsibility for taking over The Sun's website, linking to a site with the fake story under the headline "Media moguls body discovered", with "Lulz" printed at the bottom of the page.
Taken over ... The Sun website was redirecting to the LulzSec Twitter page. Taken over ... The Sun website was redirecting to the LulzSec Twitter page.
The site displaying the fake story then crashed because of heavy traffic, before The Sun's website redirected to LulzSec's Twitter page.
"TheSun.co.uk now redirects to our twitter feed. Hello, everyone that wanted to visit The Sun! How is your day? Good? Good!," the hackers wrote.
The fake Murdoch death story claimed the mogul "ingested a large quantity of palladium before stumbling into his famous topiary garden late last night".
In a tweet, LulzSec member Sabu suggested the group had also stolen News International journalists' emails or email login details. "Sun/News of the world OWNED. We're sitting on their emails. Press release tomorrow," Sabu wrote.
Sabu and other LulzSec members then began tweeting what they claimed were the usernames and passwords of top News International executives.
About 9am AEST, network administrators at The Sun appeared to have cottoned on to the hack and the entire Sun website was pulled down. Visitors were greeted with an error message.
LulzSec showed no fear of repercussions on its Twitter feed. "Arrest us. We dare you. We are the unstoppable hacking generation and you are a wasted old sack of sh--, Murdoch," read one post.
LulzSec, which had announced it was disbanding last month following the arrest of alleged members, is a global loose-knit hacker group in the same vein as Anonymous. It has targeted the US Senate, CIA, military technology contractor Booz Allen Hamilton and other government and corporate targets, purportedly for fun.
Lulz is a variation of the internet slang lol, which means laugh out loud. LulzSec members claim they do it "for the lulz", or laughs.
The group appears to have reformed just to target News International in Britain.
"Thank you for the love tonight. I know we quit, but we couldn't sit by with our wine watching this walnut-faced Murdoch clowning around," Lulzsec tweeted.
News International's websites, newsint.co.uk and newsinternational.co.uk, are also down, for unknown reasons.
The hacking of The Sun website comes as the phone hacking scandal continues to engulf News International.
A former News of the World journalist, Sean Hoare, who was one of the whistleblowers on phone hacking, was found dead at his home in Watford, about 40 kilometres from London.
Police said the death was unexplained, but not considered suspicious.
Murdoch, his son James and former News International chief executive Rebekah Brooks are scheduled to appear before members of parliament tonight, Australian time, to be grilled about what they knew about phone hacking.
News Ltd in Australia and News International in Britain are both subsidiaries of Murdoch's global News Corp empire.


 http://www.smh.com.au/technology/technology-news/lulzsec-hack-into-murdochs-british-websites-20110719-1hm6r.html#ixzz1SXpjrV8k

Monday, July 11, 2011

90 Sec News- Apple, RSA, Facebook, spyware, scareware, DDoS - June 2011



http://nakedsecurity.sophos.com/2011/07/11/apple-rsa-facebook-spyware-scareware-ddos-90-sec-news-june-2011/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+GrahamCluleysBlog+(Graham+Cluley%27s+blog)&utm_content=Twitter

Thursday, June 23, 2011

Identifying the hacktivists of the emerging cyberwar

The hacktivist landscape has become increasingly cluttered, and while the anonymity they cling to makes clearly labeling each player difficult, the rising division between these groups is beginning to give them distinct identities.
The Internet has never been a safe place, and since its inception, and introduction to consumers, privacy and security have been a major concern. Of course, now that the average person’s computer skills are many times over what they used to be, that only amplifies the problem. Couple this with the fact that millions and millions of people are uploading mass amounts of personal and sensitive data and you’ve got a recipe for some serious cyber-insecurity. The advent of hackers with a conscience has exacerbated the situation while also putting a new twist on Web ethics.
Anonymous and LulzSec have become household names, and their Internet antics have captured the attention of just about everyone, including the CIA. But as identities and opponents merge, the cyberwar landscape has become confusing. Consider this an introductory course to the who’s who of hackers.

Anonymous

Anonymous first largely appeared on many radars after making worldwide headlines for its attack on the Church of Scientology in what they called Project Chanology. But more recently the group became a household name shortly after the WikiLeaks Cablegate debacle.
When various websites refused to host WikiLeak’s site, and credit card companies wouldn’t offer a way for people to make donations to the group, the hacktivists took it upon themselves to fight WikiLeak’s enemies. Anonymous used a series of DDoS to take down MasterCard, Visa, PayPal and drew the ire of international law authorities.
So where did Anonymous come from? The group organized via popular forum 4chan and past victims include the Church of Scientology, Internet predator Chris Forcand, and censorship proponents worldwide. Many of its actions have been motivated by the groups’ personal morals, which largely focus on freedom of information. Much of its recent work has centered on the Middle East rebellions, and the group has publicly announced its fight against Iran and Egypt. Other notable targets were HB Gary, Sony PlayStation (although Anonymous claimed innocence for the PSN collapse), and Bank of America.
The group’s various press releases and announcements are typically well written and almost business-like, as have been its denials. It has often had to defend itself against many groups claiming to be hacked by Anonymous. There have been rumors of inner turmoil that has led to different factions with separate agendas and personalities. At the moment, AnonNews is down due to DDoS attacks.

LulzSecLulzSec

If Anonymous is the student body president of hackers, LulzSec is the class clown. The group hasn’t been on the public scene very long, first gaining notoriety about a month ago when attacked Fox.com in retaliation for calling the rapper Common “vile.” But LulzSec’s first breakthrough performance came when it hacked PBS and posted a fake report that Tupac Shakur was alive. The group claimed that this was in response to negative attention directed toward WikiLeaks and Bradley Manning. LulzSec also claimed responsibility for some of Sony’s hacked web properties. Over the last month, LulzSec has also hit the FBI, Nintendo, and the CIA websites.
Despite some of its very serious and established opponents, LulzSec has time and time again affirmed it’s “in it for the lulz.” The group has also been extremely communicative with the public via its Twitter feed and even a phone request line, where it will take suggestions for hacks. The group has more of a prankster air to it then serious freedom defender, although its beliefs seem to align with Anonymous’. LulzSec has taking to mocking its victims more openly and in a more lighthearted tone than Anonymous has, though, giving it an entirely different reputation than its more serious counterpart.

Anonymous vs. LulzSec?

There were rumors that Anonymous and LulzSec were opponents. After a series of DDoS attacks that slowed down various online games because of malicious traffic, some frustrated 4chan users decided to begin their own DDoS retaliation against LulzSec. The group then used its massively popular Twitter account to attack 4chan, which Anonymous took as a personal affront. By later that day, however, both had denied such a rivalry, and the two have since united for Operation Anti-Security to expose faulty handling of user data.

Web NinjasWeb Ninjas vs. Anonymous and LulzSec

It’s a good thing Anonymous and LulzSec teamed up when they did, because Web Ninjas has its eye on them. It’s rumored Web Ninjas is the home of Th3J35t3r, who took down WikiLeaks shortly after it posted its stash of confidential diplomatic cables in fall 2010. Whether or not he’s a part of the coalition, the group insists it’s working for a “safer and peaceful Internet for everyone, not some bunch of kids threatening [the] Web and trying to own it for LULZ or in the name of publicity or financial gain or anti-government agenda.” The group released a large amount of information about the alleged identities of LulzSec hackers, including their whereabouts. LulzSec has denied the seriousness and truth behind these revelations, but an associate of the group was arrested today. LulzSec downplayed the amount of his involvement in the group, saying he is largely inconsequential to their operations. LulzSec also released the information of someone they believe attempted to out them.

IdahcIdahc

Residing (purportedly) outside this interwoven ring of hackers is Idahc. The Lebanese hacker is reportedly an 18-year-old computer science student and runs a one-man operation seemingly focused on Sony and Sony alone. He personally has moral issues with Sony, particularly for its treatment of George “GeoHot” Hotz and has said “If you want ethics, go cry to Anonymous. True lulz fans, stay tuned in.” He is thought to be behind many if not all of the hacks to various Sony Web properties. Idahc calls himself a grey hat focused on exposing the insecurity of Sony user accounts.

Despite their claims of independence and purported ethical intentions, the very nature of the groups inspires distrust. And it’s difficult to admit that with the apprehension toward supporting what are legally cyber-criminals, comes some sort of interest mixed with understanding: Whether or not you agree with all of their ploys, combating oppressive regimes and censorship while also exposing the careless liberties large corporations is difficult to oppose. Of course if you’re one of the many who’s had their email and password plastered all over PasteBin recently, you might feel otherwise.
http://www.digitaltrends.com/computing/identifying-the-hacktivists-of-the-emerging-cyberwar/

Layer 7 Application attacks - (DDoS)


Security attacks are moving ‘up the stack.’  90% of security investments are focused on network security, yet according to Gartner, 75% of the attacks are focused at the application layer and ‘over 90 percent of security vulnerabilities exist at the application layer, not the network layer.’  SQL Injection and XSS are #1 and #2 reported vulnerabilities and the top two from the OWASP Top 10.  Plus, from Forrester Consulting, the average loss of revenue per hour for a layer 7 DDoS attack is $220,000.  These vulnerabilities are some of the primary routes that are being exploited in many of the recent attacks.
Modern DoS attacks are distributed, diverse and cross the cavity that divides network components from application infrastructure yet many of these attacks are preventable. The problem is that organizations are using outdated network and/or desktop technology to try and protect against sophisticated application security attacks which traditional solutions like network firewalls, IPS or AV systems have little to no visibility or role. It’s like trying to protect a city against a coordinated air attack by digging trenches in the ground. Wrong band-aid for the attack vector. 

It is interesting that these attacks have been around for a while but also shows how hard it is to get protection right, especially when the attacks are blended.  Once a vector is found to deliver, a variety of exploits can be used in quick succession to find one that will work.  Most of these attacks would also have sailed invisibly through an IPS device – no offense to those solutions – they are just not designed to protect the application layer or didn’t have a signature that matched.  A unified application delivery platform with multi-layer visibility is the best way to detect and mitigate multi-layer attacks.

http://psilvas.wordpress.com/2011/06/22/cure-your-big-app-attack/

Financial Mogul Linked to DDoS Attacks

Pavel Vrublevsky, the embattled co-founder of ChronoPay — Russia’s largest online payments processor — has reportedly fled the country after the arrest of a suspect who confessed that he was hired by Vrublevsky to launch a debilitating cyber attack against a top ChronoPay competitor.
KrebsOnSecurity has featured many stories on Vrublevsky’s role as co-founder of the infamous rogue online pharmacy Rx-Promotion, and on his efforts to situate ChronoPay as a major processor for purveyors of “scareware,” software that uses misleading computer virus infection alerts to frighten users into paying for worthless security software.  But these activities have largely gone overlooked by Russian law enforcement officials, possibly because the consequences have not impacted Russian citizens.
In the summer of 2010, rumors began flying in the Russian blogosphere that Vrublevsky had hired a hacker to launch a distributed denial of service (DDoS) attack against Assist, the company that was processing payments for Aeroflot, Russia’s largest airline. Aeroflot had opened its contract for processing payments to competitive bidding, and ChronoPay was competing against Assist and several other processors. The attack on Assist occurred just weeks before Aeroflot was to decide which company would win the contract; it so greatly affected Assist’s operations that the company was unable to process payments for extended periods of time. Citing the downtime in processing as a factor in its decision, Aeroflot ultimately awarded the contract to neither ChronoPay nor Assist, but instead to Alfa-Bank, the largest private bank in Russia.
According to documents leaked to several Russian security blogs, investigators with the Russian Federal Security Service (FSB) this month arrested a St. Petersburg man named Igor Artimovich in connection with the attacks. The documents indicate that Artimovich — known in hacker circles by the handle “Engel” — confessed to having used his botnet to attack Assist after receiving instructions and payment from Vrublevsky. The same blogs say Vrublevsky has fled the country. Sources close to the investigation say he is currently in the Maldives. Vrublevsky did not respond to multiple requests for comment.





The allegations against Artimovich and Vrublevsky were supported by evidence collected by Russian computer forensics firm Group-IB, which said it assisted the FSB with the investigation. Group-IB presented detailed information on the malware and control servers used to control more than 10,000 infected PCs, and shared with investigators screen shots of the botnet control panel (pictured at left) allegedly used to coordinate the DDoS attack against Assist. Group-IB said Artimovich’s botnet also was used to attack several rogue pharmacy programs that were competing with Rx-Promotion, including Glavmed and Spamit (these attacks also were observed by security firm SecureWorks in February).
This DDoS saga is the latest chapter in a fascinating drama playing out between the two largest rogue Internet pharmacies: Vrublevsky’s Rx-Promotion and Glavmed (a.k.a. “Spamit”), a huge pharma affiliate program run by Igor Gusev, the man who co-founded ChronoPay with Vrublevsky in 2003.
Gusev has been in exile from his native Moscow since last fall, when Russian authorities named him the world’s biggest spammer and lodged criminal charges against him for operating an illegal business. Spamit was forced to close shortly thereafter, and Gusev blames Vrublevsky for using his political connections to sabotage Spamit. Late last year, Gusev launched redeye-blog.com, a blog dedicated to highlighting alleged wrongdoing by Vrublevsky. In one post, Gusev charged that Artimovich agreed to DDoS Spamit.com because he believed forum members fleeing the program would join his own budding spammer forum: the still-active but largely dormant program Spamplanet.
Both ChronoPay and Glavmed/Spamit suffered hacking attacks last year that exposed internal documents, financial dealings and organizational emails. The data leaked from Glavmed/Spamit includes a list of contact information, earnings and bank account data for hundreds of spammers and hackers who were paid to promote the program’s online pharmacies. Those records suggest that for most of 2007, Artimovich was earning thousands of dollars a month sending spam to promote Spamit pharmacy sites.
The document that the FSB used to lay out the case for criminal proceedings against Artimovich, a.k.a. “Engel,” states that he was paid for the DDoS services with funds deposited into a WebMoney account “Z578908302415″. According to the leaked Spamit affiliate records, that same WebMoney account belonged to a Spamit affiliate who registered with the program using the email address “support@id-search.org.” Web site registration records for id-search.org show that the name of the registrant is hidden behind paid privacy protection services. But historic WHOIS records maintained by DomainTools.com reveal that for a two-month period in 2008 those registration records were exposed; during that brief window, records listed the registrant as Igor Artimovich from Kingisepp, Russia, a town 68 miles west of St. Petersburg.
The emails and documents leaked from the hacking intrusion into ChronoPay last year show that Artimovich and Vrublevsky exchanged numerous emails about payment for unspecified services. Among them is an email receipt from WebMoney showing a transfer of more than $9,000 from an account Vrublevsky controlled to Artimovich’s Z578908302415 purse on July 6, 2010, just days before the DDoS attacks began. The notation listed next to the payment receipt? “Engel.”


http://krebsonsecurity.com/2011/06/financial-mogul-linked-to-ddos-attacks/

Wednesday, June 22, 2011

Network Solutions Fights Off Multiple DDoS Attacks:

Two attacks on consecutive days left Web host and domain name registry Network Solutions' customers unable to access their Web sites and servers.
A distributed denial-of-service (DDoS) attack was carried out against Network Solutions on yesterday afternoon, and again this morning, according to a post on the company's official blog by spokesman Shashi Bellamkonda.
"Our engineers worked quickly to mitigate the attacks and services are in the process of being restored," he wrote. "We continue to monitor this situation, as potential risk still exists for these attacks to recur."
Some customers complained of outages and said they could not reach the sites hosted by Network Solutions, and were having trouble accessing their e-mail and reaching their servers as of Tuesday afternoon. The company's Twitter feed was still saying that employees were working on bringing its network back online.

http://news.hitb.org/content/network-solutions-suffers-two-ddos-attacks

Hackers attack 1,500 Vietnamese websites











 

Foreign hackers have attacked an estimated 1,500 Vietnamese websites, including the online forum for white-hat hackers, since early this month.


The list of hacked websites ranges from government sites to sites dealing with real estate and electronics. In the latest case, Kon Tum Province’s Department of Education and Training's website was disrupted on Wednesday.
On June 5, www.hvaonline.net, a popular forum for legitimate web security technicians (aka white-hat hackers) fell prey to a staunch attack.
The hackers allegedly deployed a Distributed Denial-of-Service attack (DDoS attack).
The website’s service provider announced that most of the hackers had Chinese IP addresses.
Shortly after the website was restored, on June 12, it was hit by another DoS attack.
The Vietnam National Oil and Gas Group (PetroVietnam)'s site, petrotimes.vn, and a website used by the Vietnamese Ministry of Foreign Affairs were also hacked.
IT experts said the DDoS attacks did not cause huge losses to Vietnamese websites because they could not change the content of the websites.
The hackers used the attacks just to show what they are capable of, they said.
According to commenters in a number of popular IT forums, a number of Vietnamese companies and agencies were poorly equipped to deal with the online assault. “Foreign hackers are launching organized and deliberate attacks on Vietnamese websites,” said Vo Do Thang, director of Athena Network Security Center in Ho Chi Minh City.

http://www.i-policy.org/2011/06/hackers-attack-1500-vietnamese-websites.html

Soca website taken down after LulzSec 'DDoS attack'


The UK Serious Organised Crime agency has taken its website offline after it appeared to be a victim of an attack by hacking group Lulz Security.


Soca said it had taken its website offline to limit the impact attack on clients hosted by its service provider.
Soca.gov.uk had been unavailable for much of Monday afternoon, with an intermittent service restored later.
Lulz Security has said it was behind the denial of service attack which had taken the website offline.
Earlier on Monday, as the agency launched an investigation, LulzSec tweeted: "Tango down - in the name of #AntiSec".
The group has hit a number of high-profile websites in recent weeks, including the CIA and US Senate.
Soca appeared to be the victim of a distributed denial of service (DDoS) attack, where large numbers of computers, under malicious control, overload their target with web requests.
In a statement given to BBC News, a Soca spokesman said: "Soca has chosen to take its website offline to limit the impact of DDoS attack on other clients hosted by our service provider.
"The Soca website is a source of information for the general public which is hosted by an external provider. It is not linked to our operational material or the data we hold."
Embarrassment
Earlier on Monday, a LulzSec Twitter posting seemed to confirm the nature of the attack.
"DDoS is of course our least powerful and most abundant ammunition. Government hacking is taking place right now behind the scenes," it said.
The latest attack will come as an embarrassment for Soca, which is tasked with investigating cybercrime.
"It is not going to please the boys in blue one bit," said Graham Cluley, senior technology consultant at security firm Sophos.

Mr Cluley added that it was wrong to confuse DDoS with the kind of hacking that can lead to confidential information being stolen.
However, he warned that LulzSec was capable of both types of attack.
"They have in the past broken into websites and stolen e-mail addresses and passwords, so there is a lot of harm can be done."



Big Lulz
When Lulz Security first appeared in May, the group portrayed itself as a light-hearted organisation, bent on creating online fun and Lulz (laughs).
Soon after, details of its hacking exploits began to emerge.
The first involved stealing and publishing a database of US X-Factor contestants, including their e-mail addresses and phone numbers.
It followed up with a mixture of website denial of service attacks and intrusions where data was taken and made available on the internet.
On June 19, LulzSec declared that it would begin targeting government systems, calling the campaign Antisec.
"Top priority is to steal and leak any classified government information, including e-mail spools and documentation. Prime targets are banks and other high-ranking establishments," said a post on the group's website.
The reason for LulzSec's greater focus on government is unclear, although it appears to have recently ended a feud with the more politically-motivated group Anonymous.

http://www.bbc.co.uk/news/technology-13848510

CIA website and FBI hacked by LulzSec




Hacking collective LulzSec has decided to stop giving online gaming sites a hard time and instead put its efforts into taking down the CIA's website and the FBI's phone network.
Last week the group managed to DDoS the CIA's homepage and along with it the FBI's phone network in Detroit.
As per usual LulzSec kept everyone updated with its hacking shenanigans on Twitter, posting on the site: "Tango down – CIA.Gov- for the lulz.".
According to reports, it wasn't just the CIA and the FBI, either - the US Senate's website was also a target, but the group failed to compromise the site.

Love hack
LulzSec has been extremely busy over the last few weeks, but it has mostly targeted gaming sites. Its Titanic Takeover Tuesday campaign saw the group hack into Eve Online, Minecraft, League of Legends and FinFisher.
Even though LulzSec seems to be infiltrating websites just to show how poor the security is, this latest wave of hacks will have the US government keeping more than a close eye on it.

 http://www.techradar.com/news/internet/cia-website-and-fbi-hacked-by-lulzsec-966715#ixzz1PzhuXoHY

Friday, June 10, 2011

Spain Nabs 3 Suspected Members of Anonymous



Spanish police arrested three suspected computer hackers who allegedly belonged to a loose-knit international activist group that has attacked corporate and government websites around the world, authorities said Friday. A National Police statement identified the three detainees as leaders of the Spanish section of a group that calls itself "Anonymous."
A computer server in one of their homes was used to coordinate and carry out the cyber attacks on targets including two major Spanish banks, the Italian energy company Enel and the governments of Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand, the statement said.
The statement said the only other countries to act against "Anonymous" so far are the United States and Britain. It attributed this what it called complex security measures that members use to protect their identity. The suspects in Spain were arrested in Barcelona, Valencia and the southern city of Almeria, the statement said without specifying when the detainees were picked up.

http://news.hitb.org/content/spain-nabs-3-suspected-members-anonymous?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=s3cb0t

Tuesday, June 7, 2011

Use your brain - don't let your PC turn into a zombie


IF you're in an office, like I am, take a look around. If there are 10 computers in the room, chances are one of them is a zombie.
According to a University of Sydney cyber security expert studies have shown about one in five home computers and one in 10 work computers are "zombies" that have been taken over and used to conduct illegal activity.
"The global average is 20 to 25 per cent that are probably infected which means about one in five," said Professor Michael Fry from the university's school of IT.
"These computers are taken over remotely and incorporated into botnet networks."
Botnets are networks of computers enslaved by malware allowing the "bot herder" or "bot master" to control them remotely.
Prof Fry said remotely-controlled computers were being used in everything from organised crime to cyber warfare.
"Controllers use botnets for stuff like identity theft, to launch mass spam campaigns, phishing attacks, and online advertising 'click fraud'," he said.
"But the big one that they are becoming the weapon of choice for are distributed denial of service attacks."
A denial-of-service attack is when someone directs such a huge volume of requests to a target website that the web server can't respond and the site becomes inaccessible to everyone.
A distributed denial-of-service, or DDoS, attack occurs when hundreds or thousands of infected zombie computers are enlisted to help.
Prof Fry said botnets were today's "weapon of choice" for organised crime conducting DDoS attacks and there was a strong suspicion in cyber security circles that governments had also used botnets to sabotage others countries' IT systems.
He said individuals were already using attacks such as these to extort money right here in Australia.
"We had a case where a man in Alice Springs had his system go down one day," Prof Fry said.
"A little later he received an email from a group saying 'this was us and pay up or we’ll do it again'. He told them no and the next day they attacked him, bringing his whole system down."
They are even reports that individuals are able to hire botnets for a fee.
  • One in five home computers are enslaved "zombies"
  • Enslaved PCs used by "botmasters" in cyber attacks
  • That means my computer has more of a life than I do
Aim for the head
Prof Fry said the systems which were the most vulnerable to these sorts of attacks were "unpatched" machines — computers which haven't been updated with the latest defences from software providers.
"These regular update requests can be a nuisance but are essential to stay ahead in the day to day battle against cyber crime," he said.
Craig McDonald is the founder and chief executive of MailGuard, a company specialising in the online security needs of business. He said it was essential for individuals and businesses to check for regular software updates.
"You're only as protected as the last update," Mr McDonald said.
"And for businesses, as email is highly used for 'doing business', I would recommend a multi-layered managed email filtering service."
Mr McDonald said individuals needed to ensure they followed all the directions given by their software and to run full scans of all computers.
Prof Fry said the identification of malware could sometimes be extremely hard and the process had become an "arms race".
"The less sophisticated ones can be tracked down and stopped, but the detection of zombies or the detection of bot masters can be very difficult," he said.
"The whole thing is an arms race. You can develop a tool that is very good at detecting them but as soon as you do people are working to get better at covering their tracks.
"It’s a global problem — governments, ISPs and everyone else."

The biggest threat?
Last week Attorney-General Robert McClelland and Defence Minister Stephen Smith said the Australian Government would work towards the creation of its first ever national strategy for dealing with cyber security.
"The Cyber White Paper will examine what we need to do to protect ourselves online, the role of government, industry and the public in protecting our interests," McClelland told a cyber security function in Sydney.
The paper will be completed in the first half of next year and would look at a broad range of areas including consumer protection, cyber safety, cyber crime, cyber security and cyber defence, he said.
Earlier this year the Federal Parliament was the subject of a cyber attack with the computers of at least 10 federal ministers, including Prime Minister Julia Gillard and Defence Minister Stephen Smith, targeted and confidential emails possibly accessed.
The head of Sydney University's Centre for International Security Studies, Professor Alan Dupont, said cyber attacks were "possibly the biggest security threat facing Australia".
"Of course we need to understand the technical detail of cyber crime in order to keep ahead of the game but we want people to think more broadly about cyber security," Prof Dupont said.
"We are stressing the importance of how cyber attacks are conducted, why and by whom, in order to enhance understanding of systems' susceptibility to attacks.
"If we don't get on top of this in a defensive sense, everything on a computer network is vulnerable to attack."

Read more: http://www.news.com.au/technology/use-your-brain-dont-let-your-pc-become-a-zombie/story-e6frfro0-1226070293650#ixzz1OaFtTJ9F

Thursday, May 26, 2011

Is Obama Planning to Lose World War III?


In a cyberwar fought in an Internet-driven, overconnected world, things get turned upside down. The best offense is a defense. If a cyber-attacker disables your military command and control system, shuts down and catastrophically damages your power grid, makes your telecommunication system non-functional, and cripples your financial system, there isn’t much left to fight with.

Think of what the state of the country would be without these systems. Without power and telecommunications, there would be no logistic systems, supermarket shelves would be empty, credit cards wouldn’t work and money would be unavailable from ATM’s. Water would stop flowing to your home, and since gasoline would be unavailable from electric powered pumps, your car would not work. Among the other systems subject to attack: pipelines, sewage, and water supply. You get the idea.

If President Obama and the rest of our nation’s leaders aren’t actively implementing our cyber-defenses, they are implicitly planning to lose World War III.

For a long time I thought the idea of software designed to cause great physical damage to systems was fanciful. Then I came across a story in Thomas C. Reed’s 2004 book, At the Abyss: An Insider’s History of the Cold War. Reed was a former Secretary of the Air Force and told a story about a massive, three-kiloton explosion of a Soviet pipeline–the most massive non-nuclear explosion ever observed from outer space.

According to Reed, Russian agents stole software used to control the pipeline. As it happened, the CIA had anticipated the theft and deliberately programmed the software to go haywire. Sure enough, in 1982, when the Soviets deployed the stolen software, the pumps kepts pumping while valves were shut, producing pressure in excess of those the pipeline joints and welds could stand. The massive explosion soon followed.

I certainly hope there will never be a third world war, but I know there will be an increase in cyber-warfare, cyber-terrorism, cyber-crime, and cyber–vandalism. One only has to read the newspapers to be convinced that such incidents are on the rise.

In early 2007, Estonia came under cyber-assault. Estonia is one of the most Internet-dependent countries in the world. Ninety-six percent of its banking transactions are online. Citizens pay for parking using their cell phones. The attacks first targeted government sites and then were used to knock news sites offline. They culminated on May 10 when Hansabanka, the country’s largest bank, was forced to shut down its online operations shutting down ATM’s and severing the bank’s connections to the rest of the world.

South Korea has been attacked on numerous occasions. In 2009 a series of DDOS (Distributed Denial of Service) attacks were launched against government, news media, and financial web sites. More attacks occurred early this year. The April 12 attack paralyzed the Nonghyup Bank network for a week. The attacks were believed to have been originated by the North Koreans.

On April 19, 2011, Sony began investigating a cyber-attack that was a “very carefully planned, very professional, highly sophisticated criminal cyber-attack designed to steal personal and credit card information for illegal purposes.” Sony discovered that credit card data and email addresses had been stolen from 77 million user accounts. Further investigation revealed that information was stolen from another 24.6 million online gambling accounts.

These assaults take two general forms. The first are attacks from the outside and usually take the form of DDOS (Distributed Denial of Service) attacks. In these attacks, an unauthorized remote user seizes control of thousands of computers and orders these “zombies” to flood websites with millions of messages. The overloaded systems become saturated and can no longer carry out routine operations. This type of attack brought down the Hansabanka and Nonghyup Banks.

The second form of attack is far more dangerous. The attacker gets inside the system and seizes control of the system operation or disables the system. The attacker may plant a “logic bomb” that will wake up on command or at some time in the future and might erase the system or perform some function that will injure the system under its control.

Stuxnet is a worm that was introduced into the Siemens programmed logic controllers at the Natanz uranium enrichment facility in Iran. It is believed the worm rapidly cycled the centrifuges to 1410 cycles per second and then slammed on the brakes, slowing them to 2 cycles. The rapid deceleration tore centrifuges apart. The same type of logic controller is used in numerous SANDA (Supervisory Control and Data Acquisition) systems in nuclear power and chemical plants. In a nuclear plant, such a logic bomb could cause a meltdown.

It is also possible for an attacker to use software trap doors to seize control of a command and control system and cause it to issue orders. In this scenario, troops might be ordered to attack the wrong target.

We are planning to lose World War III because we are unwilling to aggressively confront the cyber-defense issue. Confronting it is inconvenient, costly, involves regulation, and gives the government a potential window into our private lives.

But in an overconnected Internet-driven world, we must think about our current systems differently.

Here’s the problem we face: The Internet was never designed to be secure. It was designed by academics to serve the needs of trusted colleagues. While it will be impossible to make any system no matter how carefully conceived entirely secure, it is inconceivable that the existing Internet and systems based on it can be made more than marginally secure. This is not to say that the security of these systems cannot be improved.

The current activity of cyber-criminals offers convincing evidence that existing systems can be easily penetrated, and many of those systems have already been compromised. Infected computers and portable memory devices may have already introduced malware to numerous existing systems. The structure of the Internet makes it virtually impossible to identify the source of a well-executed attack.

My guess is that we can improve existing systems enough so they can continue to serve the Public and Private system users but that the current system can never be made secure enough to protect Secure and Mission Critical systems.

It is critical that we protect to the highest degree possible our Mission Critical systems. Among them are military command and control systems, systems controlling financial networks and the transfer on money within the network, networks that control our electric power. And, to a lesser extent, we need to protect other systems as well.

A few suggestions: We should consider physically disconnecting our Mission Critical systems from external networks. We should consider requiring all major ISP’s (Internet Service Providers) to install the capability to do deep packet inspection. In the case of a DDOS attack, these systems could quarantine the packets used to barrage and choke Internet systems. And we should give regulatory agencies the power to impose certain standards for cyber-security on businesses.

Doing these things will be expensive and create many inefficiencies. Many businesses will oppose these actions. Liberals and conservatives alike will worry about the potential loss of privacy and government intrusion into our lives that could result from the abuse of information collected with deep packet inspection. But realistically, it is hard to see many businesses and utilities going to the trouble and inconvenience of taking these types of actions unless they are forced to do so.

In an Internet-driven, overconnected world, power has become asymmetric. Small groups can do immeasurable amounts of damage with relatively small efforts.

Right now our country is the most vulnerable and most tempting target for cyber-terrorists and criminals. We have a highly developed physical and commercial infrastructure that is heavily dependent on the Internet. We cannot function if the Internet is shut down.

North Korea is possibly the country best positioned to attack us. They can launch cyber-attacks but their national infrastructure is so primitive that there is nothing for a cyber-warrior to attack. Cyber-terrorist are in a similar position. They have no banks or power stations for us to disable.

Our Defense Department is probably in a position to launch the most devastating and comprehensive cyber-attacks of any nation. Unfortunately, those attacks will not do much to defend many of our important systems. Probably all of them are not secure enough to withstand a sophisticated assualt.

So let’s get on with building the type of offense an Internet-driven, overconnected world requires. The new rule for that environment is “The best offense is a superior defense.” Relying as we currently do on having the best offense is a plan for losing World War III. Let’s start playing defense.

http://blogs.forbes.com/billdavidow/2011/05/24/is-obama-planning-to-lose-world-war-iii/

Tuesday, May 24, 2011

Cybercrooks turn Eve Online into botnet battlefield

Fun-spoiling, DDoSing thieves farm virtual gold to sell for cold hard cash

Crooks using online games to farm virtual currencies that they can sell for real money have turned internet spaceship game Eve Online into a battlefield for botnets.
Eve Online is home to various rival groups who generate in-game currency for gamers who want to join in without spending their time acquiring experience and resources by working their way up from the bottom. Rivals groups from eastern Europe are using botnets to DDoS opponents before taking over their territories. Regular gamers are often caught in the cross-fire of multi-pronged attacks that might occur in game, via DDoS attacks to forums, over VoIP communication systems and late night prank phone calls. Game servers have taken a hit in the process.
Gold farmers are known for using Trojans to gain control of compromised accounts. The Eve Online baddies have taken a different tack through attacks that swamp forums with junk traffic

Chris Boyd, a senior threat researcher at GFI Software and gaming security experts, said that Eve Online's difficulties are a part of wider problems in virtual worlds.
"Gold farmers can cause the price of in-world items to rise, chat channels can be flooded by sale scams, endless bots and automated processes can cause significant server load," Boyd told El Reg. "That's before you get to the problems creating by phishing, hacking and scamming established and profitable accounts."
Boyd (AKA paperghost) agreed that the miscreants on Eve Online are taking it up to 11.
"The idea that there are effectively dead systems filled with nothing but spambots and hostile empires that are happy to do battle outside of their gaming realm by DDoS'ing websites and making prank phonecalls is a fascinating insight into the troubles plaguing virtual worlds, and real world currency having a marked impact on virtual trading makes this a few steps above dedicated DDoS botnets designed for nothing other than kicking console gamers out of Halo 3 sessions."
Various groups rumoured to be working out of Eastern Europe and Russia are said to be offering in-game currency for real money. "Investigations by the owners of the game have caused several leaders of these alliances to be banned in the past," explained Reg reader Patrick, who was the first to tell us of the hive of villainy within Eve Online.

http://www.theregister.co.uk/2011/05/23/eve_online_botnet_mayhem/

The Explosion of Cybercrime

 
 
Cybercrime is any crime involving a computer or a network and cybercrime has increased significantly in the past decade. Most organizations value employees that have an understanding of IT security risks, and many organizations require employees to have specific security certifications. This article provides an overview of various types of cyber crime, including cyber extorsion, botnets, morophing malware, and online fraud.
Cybercrime is broadly defined as any crime involving a computer or a network. In the last decade, the amount of cybercrime has grown substantially resulting in significant losses to businesses, and lining the pockets of criminals. This article presents some information about some of the common cybercrime activities and it helps emphasize the value of IT security for any organization.
It also helps to emphasize the value organizations place on employees with IT security awareness. The (ISC)2 CISSP has become one of the top IT security certifications and many organizations seek employees with this certification for both IT jobs and managerial positions. Lower level security certifications such as CompTIA’s Security+ and the (ISC)2 SSCP are also valued by organizations. For example, the U.S. Department of Defense requires anyone with an administrative account to have at least a Security+ certification.

Cyber Extortion

In high-crime areas, extortionists have demanded payments from businesses for “protection.” If the businesses refused, the business was attacked, robbed, employees harassed, and in extreme cases, the business was burned. Of course, the extortionists actually attacked the businesses when the protection money wasn’t paid.
Extortion has made it to the cyber community. Attackers use distributed denial of service (DDoS) attacks to show they can cripple Websites and corporate networks. They then demand protection payments to stop the attacks. Ron Lepofsky wrote in 2006 that the U.S. and FBI receive at least 20 new cases of cyber extortion a month. Blackmailers use various types of denial of service attacks to cripple Websites and corporate networks. They then demand protection payments to restore the service. Extortionists have demanded ransoms of more than 1 million dollars to stop the attacks. Some companies quietly pay. Others attempt to fight back.
A smaller form of cyber extortion is in the form of rogueware, or fake antivirus software. A user visits a Website and sees a popup indicating their system is infected, and encouraging them to download free software to clean their system. After the user downloads and installs the software, the rogueware reports several serious infections, but then states that the free version only scans the system, but won’t clean it. If they want to clean their system, they must pay between $49.95 and $79.95 for the full version. PandaLabs reported in 2008 that criminals were extorting approximately $34 million dollars a month from unsuspecting users. While this is bad enough in itself, the rogueware provides zero protection against actual malware, leaving the user with a false sense of security.
Additionally, many rogueware criminals include additional malware in the rogueware. For example, an added keystroke logger can capture a user’s keystrokes (such as capturing passwords for online banking accounts) and periodically send the data to the criminal. Many versions also include software to convert the computer into a zombie as part of a botnet.

Botnets

Botnets have grown to astronomical proportions over the past few years, and despite some successes, they’re still stealing money from people every day. As an example, NBC reported in 2004 how a small business in Miami was attacked. Specifically, their computer was infected with the CoreFlood virus (used in the COREFLOOD botnet) and someone transferred $90K out of their Bank of America account without their authorization to a bank in Latvia. Before this, the COREFLOOD botnet was primarily known for DDoS attacks.
Other losses from the COREFLOOD botnet include $115K from a real estate company in Michigan, $78K from a law firm in South Carolina, $151K from an investment company in North Carolina. The list goes on and on. Don’t think they’re only attacking businesses though. It’s just that when an individual’s $1,000 in savings is stolen, it isn’t as newsworthy as a loss of tens of thousands of dollars. Still, the loss of $1,000 by an individual can be devastating.
Interestingly, a report in June 2008 by Joe Stewart (Director of Malware Research, Dell SecureWorks) showed this same botnet was still in operation and the bot herders had shifted their activities from DDoS attacks, to full-fledged bank fraud. After all, they found they could get quick paydays with much less effort. At that time, they had infected over 378,000 computers and had at least one database with over 50 Gigabytes of data on hapless users around the world. The botnet had captured keystrokes and recorded bank passwords, credit card data, email passwords, social network passwords, and more.
As of February 2010, this botnet had grown to over 2.3 million infected computers with 1.8 million of the computers in the United States. Thankfully, the U. S. Department of Justice took several steps in April 2011 to take over the botnet’s command and control servers and may have succeeded in shutting this botnet down. We’ll see.
The point is botnets are thriving. Even though experts are shutting down some of the large botnets, it’s like a game of whack-a-mole. They keep popping up. In years past, malware was used to cause damage to systems such as corrupting a hard drive or system files. Today, malware is a tool often used by criminals to steal identities and hard cash from regular people just like you and me.

Morphing Malware

Malware is increasingly difficult to detect, mostly because attackers are constantly developing new methods and strategies. One common method used today is polymorphism. Malicious code within a single virus can be run through a mutation engine to create thousands of different versions of the same virus. While one version may be detected by a malware detection signature, thousands of other mutations may get past this signature until another signature is developed to detect the mutated versions.
At one point, it was recommended that you update your antivirus definitions on a weekly basis. Some experts now suggest you update it hourly. Malware vendors are constantly working on detecting new variants, updating signature files, and publishing them.
It’s also worth noting that all antivirus (AV) software is not created equal. Virus Bulletin publishes a monthly report on the effectiveness of AV products that is quite enlightening. You may think that malware products can consistently detect close to 100 percent of malware in the wild, but that is not the case. For example, this graph shows a wide scattering of products in the 60 percent to 80 percent effectiveness ranges. This equates to a grade somewhere between a B and a D. For me, I don’t want the D student protecting my bank accounts and identity.
It’s also worth pointing out that criminals have discovered the power of malware when used effectively for criminal activities. While malware was previously used to take down systems or networks just for the fun of it, criminals don’t do that today. Instead, criminals use malware to enlist zombies into their huge botnets. These zombies then engage in activities allowing the criminals to steal money from people and organizations on a grand scale.

Zero Day Vulnerabilities

Zero day vulnerabilities are those that are known to attackers, but either not known to the vendor, or the vendor has not developed and released a fix yet. While this implies that a zero day vulnerability lasts only a single day, it can actually last months before a fix is written, tested, and released.
In other words, even if you are taking steps such as keeping a system up-to-date, running AV software, and regularly updating signature files, you are still at risk from zero day vulnerabilities. Defense-in-depth procedures within an organization include a variety of other security practices to protect systems and networks to help protect them from zero day vulnerabilities.

Online Fraud

Cybersource publishes an annual fraud report on online fraud. Online fraud is fraud occurring through the Internet, such as charges on stolen credit cards, and chargebacks required by a credit card’s issuing bank. In the 2011 Online Fraud Report, Cybersource reported that losses from online fraud was about 2.7 billion dollars in 2010.
The good news is that online fraud appears to be declining. Online revenue losses due to fraud were estimated at 3.3 billion in 2009 and a peak of 4 billion in 2008. While this may look like criminals are trying less, that’s not actually the case. Instead online retailers have dedicated more and more resources to blocking cybercrime and are enjoying some success. That is if you want to call an annual loss of 2.7 billion dollars a success.

Conclusion

If you’re studying IT security certifications (such as CompTIA Security+, or the (ISC)2 SSCP or CISSP), expect your skills and your knowledge to be in high demand. Organizations using computers, and especially organizations with an online presence, are recognizing the risks to IT systems and networks. More and more organizations value individuals that understand these risks.

http://www.informit.com/articles/article.aspx?p=1713590

Thursday, May 12, 2011

After Sony PSN hack, ‘civil war’ fractures hacker group Anonymous

A "splinter group" has reportedly taken control of two websites that host hacker group Anonymous' primary communications channels in an attempt to decentralize the group.



Anonymous, the hacktivist group whose members were recently accused of conducting a massive breach of Sony’s PlayStation Network, appears to be coming apart at the seams following a “coup d’etat” takeover of the group’s primary communications network.
According to website Thinq_, a “splinter group” has seized control of two websites used by Anonymous to organize their various distributed denial of service (DDoS) attacks against their corporate and geopolitical enemies. Those site are AnonOps.net and AnonOps.ru, both of which host the Internet relay chat (IRC) channels used by Anonymous members.
A member of the AnonOps network staff, who goes by the name “Ryan,” tells Thinq_ that he and a number of other disaffected Anonymous members seized control of the sites because they believed the group had become too centralized. They also accuse some members of “behind-the-scenes string-pulling” that allowed these Anons to assume leadership positions in the previously headless organization.
Before now, it has been widely stated that Anonymous has no central leadership, a tactic used to limit the ability of law enforcement (or anyone else, for that matter) from discovering Anonymous members’ real identities, or infiltrating their operations. This, says Ryan, is “bullshit.”  In fact, he says, there are ten users that make all the decisions during a DDoS campaign, which is done in a single IRC channel.
“There is a hierarchy. All the power, all the DDoS – it’s in that channel,” he says.
To further make his point, Ryan leaked the IP addresses of more than 650 AnonOps users to the Internet — a move he says was “regrettable but necessary” to prove that their system for organizing attacks was insecure, and promote the idea that Anonymous must decentralize to survive.
The Anonymous members that Ryan says act as puppet masters for the group firmly refute his claims, and insists that it is Ryan, not they, who has gone off the deep end.
“[Ryan] accuses us of trying to control Anonymous from behind the scenes,” one Anon told Thinq_. “In fact, the channel he refers to was for chat moderation and he himself was part of it.”
The group says that Ryan — who is allegedly behind the controversial transformation of Encyclopedia Dramatica into ‘Oh Internet’ — is threatening to use an 800,000-computer-strong botnet (a group of computers taken over by hackers) to attack AnonOps, if they are able to take back the site from the splinter group. They also called Ryan “dangerous,” prone to “outbursts,” and “arrogant and narcissistic.”
“We all knew Ryan was dangerous,” said one Anon. “Just how dangerous nobody was quite sure. He has always had little outbursts. We knew one day there would be a massive one, but we were never sure when.”

http://www.digitaltrends.com/computing/after-sony-psn-hack-civil-war-fractures-hacker-group-anonymous/