Check out The Most Innovative, Highly rated Contact Center World Events EVER!
...Thousands of past delegates agree! - BOOK YOUR PLACE TODAY!
NORTH and south americasSTARTS IN:
ORLANDO, FL USA
asia pacificSTARTS IN:
KOTA KINABALU, MALAYSIA
BEST IN THE WORLDSTARTS IN:
Network, Learn, benchmark in this unique best practice forum with the best practitioners in the World
...who run centers and take your center to new levels of performance, engage staff, improve service and more!
Industry Research : Imperva Analyzes High-Profile ‘Anonymous’ Attack
Imperva, Inc. (NYSE: IMPV), a provider of a new category of data security solutions for high-value business data in the data center, released today a report that reveals details on an attack by hacktivist group ‘Anonymous’ against a high-profile unnamed target during a 25-day period in 2011.
The Hacker Intelligence Summary Report –The Anatomy of an Anonymous Attackoffers a comprehensive analysis of the attack, including a detailed timeline of activities from start to finish, an examination of the hacking methods utilized and insights on the use of social media to recruit participants and coordinate the attack.
"Our research shows that Anonymous generally mimics the approach used by for-profit hackers, leveraging widely known methods – SQL injection and DDoS – to carry out their attack. We found that Anonymous, although it has developed some custom attack tools, generally uses inexpensive, off-the-shelf tools as opposed to developing complex attacks," said Amichai Shulman, Co-Founder and CTO of Imperva."Our research further shows that Anonymous will try to steal data first and, if that fails, attempt a DDoS attack."
Highlights from the study of the Anonymous attack include:
-The attack was made up of three distinct phases: recruitment and communication, reconnaissance and application layer attacks and, finally, a distributed denial of service (DDoS) attack.
-Social media channels, especially Twitter, Facebook and YouTube, were the predominant means for suggesting a target and justifying the attack, as well as recruiting volunteers to participate in the hacking campaign, during the first recruitment and communication phase.
-Sophisticated hackers made up only a small portion of the volunteers and were primarily active during the reconnaissance and application attack phase, tasked with probing for vulnerabilities and waging application attacks like SQL injection to attempt to steal data from the targets.
-Laypeople were leveraged only in the third phase - to help carry out a DDoS attack - since the attempt to steal data through application attacks failed.
-Anonymous has developed some custom attack tools – specifically the low orbit ion cannon (LOIC) and a tool to enable the launch of a DDoS attack from mobile browsers.However, the group also relies on widely available tools for finding and exploiting web application vulnerabilities during the reconnaissance and application attack phase.
-Unlike for profit hackers, Anonymous rarely relies on common hacking techniques such as botnets, malware, phishing or spear phishing.
"Imperva’s Application Defense Center (ADC) was able to witness and report on an Anonymous attack from start to finish," continued Shulman. "The analysis of this attack provides useful insight into how Anonymous recruits participants and wages an attack. We believe these details will help organizations prepare for and respond to a potential attack, as well as offer the greater security community a deeper understanding of how hacktivists operate."
Today's Tip of the Day - Gather Your Own Information
More Editorial From Imperva
Published: Tuesday, February 28, 2012