A student at Monroe High School in Monroe, Michigan, was recently caught conducting a distributed denial of service attack (DDoS), and Monroe Public Schools Superintendent Barry Martin says the district will be pressing charges.
Over a period of two weeks, the unnamed student managed to take the network down for ten to fifteen minutes at a time during the school day. This had a heightened effect on the district, as modern-day high schools rely heavily on the Internet for administration as well as classroom instruction.
“We are so reliant on the Internet that we can’t afford to have down time,”
said Stephen McNew, the superintendent of the district in which the student attended school.
No Sensitive Data Compromised
Despite having success at being disruptive, an act that the student considered to be a prank, no sensitive documents, e-mails, or files were ever compromised, which should contribute greatly to his defense. Merely disrupting communications is far less of a crime than is stealing sensitive information about other students or private communications between staff members.
“A Good Student”
Barry Martin called the alleged hacker “a good student” in comments to the Monroe News but said that this act could not be tolerated, and charges would be filed. DDoS is a federal felony, but from the sounds of it, the FBI has not yet been involved in the case. It is taken very seriously when the targets are larger organizations or government institutions, and ordinarily those who are serious about conducting DDoS attacks are careful to cover their tracks.
It is not yet evident how the student was found to be a suspect in the case, but in the town of roughly 20,000 people, the pool of likely suspects is rather slim. The profile would be a student with high grades and extreme computer aptitude. This would make the pool of likely suspects even smaller. The way that high schools often conduct such investigations, the student would have been brought in front of a police officer and interrogated until he confessed. Like as not, school officials would pretend to know already that he was guilty, and he would confess. Equally as likely, the student bragged about it to another student, who then turned him in.
Another thing that the administrators said about the student was that he probably didn’t know the seriousness of what he was doing. This is in line with existing research that has concluded that adolescents are less likely to consider the consequences of their actions before taking them.
Locals Have Mixed Feelings
Many locals on the Monroe News Facebook page felt that a felony would be too stern a response for the gifted student’s prank. After all, in the end, the one thing he illustrated was that the school district had a weak network infrastructure that needs upgrading. Especially if, as administrators have said, they are extremely reliant on the Internet in daily teaching.
Here are some of the comments to the page:
What do you think? Is a felony charge too harsh for a simple DDoS attack on a weak school network? Or should the student be given community service and be allowed to finish his high school education? Share above and comment below.
Images from Shutterstock and phm.link.
The Biggest DDoS Attack of 2016 Was Caused by an Angry Gamer
October 2016 saw the biggest DDoS attack of the year target a DNS services company called DYN. The massive attack pumped more than one terabit of data per second, crashing the company’s servers. Even tough Dyn attempted to mitigate the attack, major websites such as Twitter, Netflix and Reddit were temporarily taken down.
Hacked.com reported that one cryptographer called it before it happened, as someone was testing the defensive capabilities of companies who provide core internet services. Even though network-wide outage didn’t occur, it still crashed a part internet in the US.
Now net information came to light. Reportedly, a very angry gamer had a grudge against Sony’s PlayStation Network. Dale Drew, CSO of Level 3 Communications, stated:
We believe that in the case of Dyn, the relatively unsophisticated attacker sought to take offline a gaming site with which it had a personal grudge and rented time on the IoT botnet to accomplish this
Drew didn’t name Sony’s PlayStation Network, but the Wall Street Journal found sources that did.
As it turns out, one gamers’ grudge was enough to take down a few major websites. It might seem odd, but the IoT brought vulnerabilities that allow hackers to create entire armies with the use of botnets – in this case, the Mirai botnet.
How One Individual Crippled the Internet
According to Forbes, the individual found hackers on a dark net criminal forum selling access to huge armies of IoT devices infected with the Mirai botnet. The angry gamer paid $7500 for temporary access to the powerful cyberweapon. Then, in an act of revenge, he aimed its “cannons” at Dyn.
Mikko Hypponen, Chief Research Officer at F-Secure, even said on Twitter the ad for the Mirai botnet was on the Alpha Bay form. Alpha Bay is a very popular deep web market, that surged in popularity after Silk Road’s era.
The attack on Dyn was close to the world DDoS record, which was accomplished against OVH, a French hosting provider. The record was at over 1 terabit per second, little above the DDoS attack that recently crippled the internet.
Image from Shutterstock.
Botnet DDoS Attacks More Sophisticated Than Ever
A new report by security firm Kaspersky Lab has revealed that as many as 67 countries’ resources and installations have been targeted by botnet-based DDoS attacks, in Q3 2016 alone.
The world received a rude jolt of the increasing threat of cyberattacks when DNS provider Dyn was targeted in an unprecedented DDoS attack in October 2016. That cyberattack was caused from a botnet that included IoT (Internet of Things) devices like surveillance cameras and routers. Suffice to say, the DNS blackout was undoubtedly the most notable DDoS-induced disruption in a growing trend of botnet-assisted DDoS attacks.
A new report by Kaspersky Lab has now revealed that servers used for such attacks have seen a considerable increase. So too, has the number of sophisticated DDoS attacks emanating from encrypted traffic.
A staggering majority of the targeted resources (62.6%) by botnet DDoS attacks were located in China, in a continuing trend. China, the United States and South Korea, in that order, see the unfortunate distinction of leading the charts in both – the number of DDoS attacks and the number of targets. While China and South Korea saw the number of victims decrease, the number of attacks on resources located in the U.S., Russia and Japan has increased.
Still, despite the decrease in the total number of attacks registered, China remains the country with the most targeted sources. One particularly popular Chinese search engine saw 19 mammoth botnet-DDoS attacks while one Chinese internet provider bore the brunt of the longest attack in the entire quarter, clocking a total of 184 long hours. That’s over a week of one sustained DDoS attack!
The report also revealed another notable takeaway, with Linux botnets increasing even further, with 78.9% of all detected attacks in Q3 2016 stemming from Linux botnets.
“Smart” Attacks on the Rise
Attacks using encryption of transmitted data, typically known as “smart” attacks have also grown in number. A smart-attack usually targets parts of the website that are heavy on scripts, leading to an increased load when compared to other parts of the website. For instance, a smart attack would typically target a relatively small number of queries toward a search form, with an encrypted connection. Since the attack uses low intensity encrypted traffic, they usually escape the mitigation filters employed by specialized DDoS protection providers.
Elaborating on these attacks, Kirill IIganaev, head of Kaspersky DDoS protection stated:
This method is growing in popularity because amplification attacks are becoming more complicated and inefficient for cybercriminals.
Furthermore, IIGanaev points to the concentrated effort in moving websites away from the traditional HTTP protocol to a more secure, encrypted connection standard like HTTPS.
All this suggests that the number of encryption-based attacks will only grow, meaning developers have to immediately start revising their anti-DDoS protection measures, and owners of web resources need to take a responsible approach to choosing a security solution.
Image from Shutterstock.
Is a Decentralized Internet the Solution to Outages?
“Attacks that we witnessed today were possible mainly because there is a centralized infrastructure which could have been targeted,” said Piotr Janiuk, CTO of Golem, which seeks to decentralize the internet using peer-to-peer technology. “The attack itself isn’t easy to carry out, but it is obvious that even the backbone infrastructure behind the Internet contains single points of failure which are prone to such malicious activity – even though the infrastructure may comprise multiple machines. As of today, the trend is to move towards distributed solutions and the main problem is the lack of standard way of setting up the infrastructure.”
Golem is among a legion of technologists who believe a decentralized everything is the best way avoid problems such as the widespread outages experienced in the US, the UK and western Europe going into the weekend.
The source of the Friday outages is New Hampshire internet infrastructure company, Dyn, which endured two separate cyber attacks within hours of each other. Dozens of websites, including PayPal, Twitter, Spotify, Netflix and others went down.
The outages began in the Eastern United States before affecting other parts of the country. Gizmodo cited five dozen sites seemingly affected by the attack, including CNN, HBO Now, Mashable, the New York Times, People.com, the Wall Street Journal and Yelp! affected by the attacks. U.S. officials from the U.S. State Department of Homeland Security and the Federal Bureau of Investigation opened an investigation into the attacks.
Amazon reported the outage affected users in Western Europe. Twitter and select news sites were out in London on Friday evening. PayPal Holdings Inc. experienced outages in “certain regions” affecting payments.
Spotify, Reddit, AirBnB, the Verge all reportedly suffered outages. Amazon.com Inc’s web services, cloud computing service, reported outages, as well. That meant companies like Visa, Twitter and Netflix went down. Could all this be avoided with a decentralized internet?
“If you do a Google patent search you will see the state-of-the-art there,” Maidsafe CEO David Irvine told Hacked.com. “It’s very new.”
Maidsafe, and it’s SAFE network is modelled on colonies in nature, servers and intermediaries do not make logical sense and we sort of all know that in our deepest thoughts. Some say a decentralized internet is not possible.
“DDOS depends on a target, in SAFE the target is everyone’s computers,” Mr. Irvine said. “An analogy would be DDOS is like swatting a large fly, in SAFE the large fly is a mass swarm of mossies which makes it hard even with 8 arms filled with fly swatters.” Mr. Irvine hopes the SAFE network might help to form the primordial soup of a decentralized internet.
SAFE uses xor addressing, a type of data structure used in computer programming, which means any node outages will be covered by the nearest nodes.
“This makes those mossies like zombie mossies or perhaps hydra like,” Mr. Irvine said.
This is stretching a little, he admits. Since no such decentralized networks exist, it’s difficult to know what one’s vulnerabilities might be. Maidsafe employs university research to help answer some questions. Maidsafe uses data chains, which are different from blockchains.
The Maidsafe model does not assume every node/person needs to know and agree on all information like in the Bitcoin blockchain model. “Detailed information is local and less detailed is more global,” he said. “This is like posting a letter, the closer to the destination the more info is known of the destination.”
The Golem Project’s vision of a decentralized internet entails running the ‘Golem app.’
“It’s hard to predict the definite direction in which distributed solutions will go but if infrastructure similar to Golem (production version with lots of nodes) was up and running then any service running on top of it would be resilient to this type of attacks,” Mr Janiuk told Hacked.com. “Of course at this point there is still a lot of work in the field not only because the infrastructure has to be deployed but also all sorts of utilities which are available today would have to be tailored to this new paradigm.”
He adds: “It seems that the centralised Internet of today is more and more pushed to its limits and the change of paradigm is inevitable in a longer run.” If the Internet is to grow and thrive, then the decentralization seems to be one of the best (if not the best) options.”
Images from Shutterstock.
- Ripple Spikes 50% as Bitcoin Lifts Smaller Altcoin...
- Technical Analysis: Bitcoin Grinds Higher as Recor...
- Trade Recommendation: Siacoin
- Trade Recommendation: ETC/BTC Pair Bottoming Out
- What’s Behind the Cryptosurge
- Trade Recommendation: Syscoin
- A Career in Crypto: How to Work in the World’s Fas...
- Crypto Market Reaches Historic Milestone as Ether, Ripple Surge December 14, 2017
- Technical Analysis: Volatility on the Rise Again, as Ripple and Ethereum Hit Targets December 13, 2017
- Federal Reserve Hikes Interest Rates for Third Time This Year, Keep 2018 Policy Outlook Unchanged December 13, 2017
- Trump’s Proposed Tax Changes Could Impact Cryptocurrency Investors December 13, 2017
- Trade Recommendation: Syscoin December 13, 2017
- Trade Recommendation: Ride the Next Rally of Bitcoin December 13, 2017
- Ethereum Just Broke $700 for the First Time December 13, 2017
- Trade Recommendation: ETC/BTC Pair Bottoming Out December 13, 2017
- Trade Recommendation: USDJPY December 13, 2017
- What’s Behind the Cryptosurge December 13, 2017
A part of CCN
Analysis4 days ago
Long-Term Cryptocurrency Analysis: Look Out Below?
Recommendations5 days ago
Trade Recommendation: Litecoin
Analysis1 week ago
$100 Litecoin Looks Poised for Greater Upside
Cryptocurrencies1 week ago
Trade Recommendation: Neo
Cryptocurrencies4 days ago
Trade Recommendation: Zcash
Cryptocurrencies1 day ago
Trade Recommendation: Bitcoin Cash
Cryptocurrencies5 days ago
Trade Recommendation: Stellar
Cryptocurrencies5 days ago
Trade Recommendation: Ethereum Classic