Presentation from Dennis Usle during TakeDownCon in Huntsville, AL that discusses Availability-based threats; Attacks on U.S. banks and others popular attack patterns & trends.
In the Line of Fire-the Morphology of Cyber AttacksRadware
Dennis Ulse's Presentation from SecureWorld Expo Atlanta that discusses Availability-based threats; Attacks on U.S. banks and other popular attack patterns and trends.
The document discusses a presentation given at Black Hat 2013 about bypassing DDoS mitigation techniques. It describes a new tool called "Kill'em All 1.0" that is designed to generate realistic human-like traffic to circumvent detection. The tool supports features like authentication bypass, HTTP headers, JavaScript execution, and captcha solving. It was allegedly tested successfully against major CDNs. The presenters concluded that current DDoS defenses are becoming less effective and attacks are becoming more sophisticated.
SecureWorld St. Louis: Survival in an Evolving Threat LandscapeRadware
David Hobbs’ presentation from SecureWorld Expo - St. Louis discusses availability-based threats; attacks on U.S. banks and other popular attack patterns & trends.
In the Line of Fire-the Morphology of Cyber AttacksRadware
David Hobbs’ Presentation from his series of presentations during SecureWorld that discusses Availability-based threats; Attacks on U.S. banks and others popular attack patterns & trends.
Cyber war, cyber terrorism, and cyber espionage were discussed. The document began by noting some disclaimers from the author about their expertise and intentions. It then discussed how cyber war is often misunderstood and does not refer to things like cybercrime or hacking. The document went on to discuss how cyber attacks could potentially lead to accidental nuclear war by degrading decision making systems. It also provided a real example of how access was gained to a strategic nuclear system, highlighting the risks of cyber threats in this domain.
The June 2016 revelations of the DNC breach by two Russia-based advanced persistent threat groups was only the beginning of a series of strategic leaks and conflicting attribution claims. In a series of “1-2 punches”, we saw attacks designed to breach the target and exfiltrate data reinforced by a campaign to leak information using mouthpieces posing as hacktivists. In this presentation we'll demonstrate techniques used to identify additional malicious infrastructure, evaluate the validity of “faketivists” like the Guccifer 2.0 persona, strengths and gaps in the attribution analysis, and how the adversary might adjust their tactics going forward.
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
Is the world in the midst of a cyber-war? If so, what are the implications?
In this presentation Carl Herberger, Radware's VP of Security Solutions, explores some of the most notable recent cyber-attacks and how many of the findings correlate with the tenets of warfare as defined in The Art of War by Sun Tzu, the ancient military general, strategist and tactician.
How should organizations be preparing for an information security landscape that is shaped by ideologically motivated cyber warfare rather than just opportunistic cyber-crime? Learn the techniques being employed to safeguard IT operations in a theatre that is witnessing ever more sophisticated attacks.
For more on how to help detect, mitigate and win this cyber war battle, visit here: http://www.radware.com/ert-report-2013/ to download the 2013 Global Application and Network Security Report.
Are we near the point of cyber-armageddon or are we simply engaged in a new reality of information security priorities? Are the attacks being discovered daily against private sector and public federal systems somehow unique and new, or are they simply the new reality of cyberspace? Organizations are regularly forced to make difficult decisions about how best to protect their information systems. Executives daily open the newspaper to find another example of effective cyber attacks and hacking. How do organizations know when security mechanisms are enough to keep their data safe? In an effort to answer this question and respond to mounting cyber incidents worldwide, the US federal government has been engaging in numerous efforts to secure cyberspace. But what are they and will they be enough? In this presentation James Tarala, a Senior Instructor with the SANS Institute and a Principal Consultant at Enclave Security, will describe current efforts and the tools being offered to help citizens and protect cyberspace.
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
DDoS attacks have catapulted to the forefront of banking security news after the industry experienced a series of multi-phased attacks beginning back in September of 2012. Hackers launch DDoS attacks prompted by one of two common motives. Protest attacks, like OpUSA, target large, high-profile banks and are often launched for social or political purposes. Attacks on community banks are usually used to as a distraction in conjunction with account takeover attacks. This event is designed to strengthen the awareness and defenses of participants. Jay McLaughlin, this session's presenter, fights cybercrime aimed at financial institutions on a daily basis as Q2ebanking's Chief Security Officer. Jay will break down conceptual and technical aspects of DDoS attack types, clarify the differing attacker motives, and discuss how community banks can build a layered security model to prevent DDoS attacks.
The document provides an after action report summarizing lessons learned from the November 2015 Paris attacks and the 1993 WTC bombing. It discusses how the attacks showed the importance of business continuity planning and an all-hazards approach. Key lessons included the need for physical security, interagency cooperation, and protecting crowded areas from terrorist attacks. The attacks also demonstrated how organizations must have resilient systems to maintain operations during crises.
The document discusses cyber security threats posed by distributed denial of service (DDoS) attacks. It provides background on DDoS attacks, including their origins from hacktivism, cybercrime, and cyber war. It examines the 2011 attacks against major government agencies by the hacktivist group Anonymous. The document explores whether DDoS attacks should be considered a form of protest or a criminal act. It notes that while protection technologies exist, more intelligence, capabilities, and cooperation are still needed to adequately defend against evolving DDoS threats. The presentation concludes by describing Radware's attack mitigation system for providing end-to-end DDoS protection both on-premises and in the cloud.
Anonymous groups in Tunisia launched cyber attacks against government targets to promote internet freedom and transparency. The attacks included distributed denial of service (DDoS) attacks using tools like the Low Orbit Ion Cannon. The Tunisian Computer Emergency Response Team coordinated the national response, activating defense plans and working with internet service providers, telecom companies, and international partners to monitor attacks, analyze logs, develop blacklists of attacking IP addresses, and secure vulnerable systems. Their role was to inform stakeholders and coordinate monitoring, analysis, and sharing of technical information to defend against the attacks.
CS101- Introduction to Computing- Lecture 39Bilal Ahmed
Cyber crime takes many forms such as denial of service attacks, software piracy, viruses, and industrial espionage. DoS attacks involve overloading servers with traffic to render them unusable. Viruses are self-replicating software that infect files and systems. Common defenses include email filtering, intrusion detection, encryption, and antivirus software. Engaging in cyber crimes can result in legal prosecution with jail time and fines.
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemJennifer Nichols
This document discusses DNS security risks and how to better secure DNS infrastructure. It outlines five common DNS attack types, including TCP SYN floods, UDP floods, spoofed source address attacks, cache poisoning attacks, and man-in-the-middle attacks. It argues that general-purpose computers running operating systems like UNIX are not well-suited for DNS servers due to the complexity of securing the OS, difficulty of regularly updating both the OS and DNS software, and risk of compromise via user logins. Instead, it advocates for purpose-built appliances that are easier to secure and update to better prevent DNS attacks.
Cyber warfare involves actions by a nation to penetrate another nation's computers or networks to cause damage or disruption across military, economic, political and social systems. While some experts argue for counterattacks in response to cyber harm, attribution of attacks is challenging due to spoofing of technical data. Existing international law does not fully cover cyber warfare. Other-than-internet attacks using vectors like USB devices or altered hardware present new ethical issues for policymakers seeking to prevent attacks while maintaining legitimacy of responses. A workable international treaty on cyber warfare will likely not be possible for over a decade.
The document appears to be a collection of links to photos on Flickr accompanied by short captions. It discusses the author's interests and experiences in areas such as photography, creative design, music, mechanics, drawing, sculpture, invention, and more. Each section includes 2-3 links to relevant photos on Flickr to illustrate the topic. The overall document provides a high-level overview of the author's background and experiences through short captions accompanying various photo links.
Hacking has evolved over time from a positive term referring to clever programming to taking on a negative connotation of illegal computer access. It now includes spreading viruses/worms, denial of service attacks, and political/hacktivism. The law prohibits unauthorized access and expanded definitions of damage and loss. Law enforcement uses undercover operations, tracking handles, and computer forensics to catch hackers. Penalties depend on intent and damage, with most young hackers receiving probation. Responsibility for security includes developers securing systems, businesses monitoring networks, and users educating themselves.
The document discusses using photoplethysmographic (PPG) signals for biometric recognition. PPG signals are obtained by illuminating the skin and measuring changes in light absorption. Compared to other biometrics, PPG is low-cost, easy to use, and can be accessed from various body sites. The document outlines the process of PPG signal acquisition, pre-processing, time-domain feature extraction using the original and derivative PPG signals, and classification using k-nearest neighbors. PPG signals can also be used to measure heart rate with a pulse oximeter.
The recent batch of mega retailers that have been compromised, including Target, Neiman Marcus and Michaels, has revealed just how vulnerable payment systems are. Even with sophisticated tools, strong security policies, updated regulatory requirements such as PCI v3 and other measures to mitigate these attacks, hackers are still able to compromise the systems by taking advantage of inherent vulnerabilities in payment systems.
In this webcast, payment systems expert Slava Gomzin, author of Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, will show us how retailers such as Target were compromised, what went wrong, failures in PCI to address all vulnerabilities and how these types of breaches can be prevented in the future.
Webcast participants will also receive a free sample chapter of Slava’s book on “Payment Application Architecture,” which provides a detailed overview of how payment systems work, protocols and their weaknesses.
The power of Structured Journalism & Hacker Culture in NPRPoderomedia
A keynote Miguel Paz gave for a brown bag lunch at NPR in April, 2015, organized by the Research, Analysis and Data team of this awesome media organization. While it is focused on NPR most of the ideas apply to other news organizations as well.
The Raspberry Pi is a credit-card sized computer that can perform many of the functions of a desktop computer. It has a 700MHz processor, 512MB of RAM, HDMI and USB ports, and runs Linux-based operating systems from a microSD card. While less powerful than a laptop, the Raspberry Pi provides an inexpensive platform for learning programming through languages like Python and experimenting with electronics. It has found applications as a desktop computer, game console, web server, and more. Later versions of the Raspberry Pi, such as the Raspberry Pi 3, increased processing power while maintaining a low price point.
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
This document discusses common cybersecurity threats such as social engineering, phishing, ransomware, and malware distributed via email. It provides tips to help avoid these threats and emphasizes that cybersecurity requires vigilance from all users as even a single weak link can compromise an entire network. National Life Group holds a yearly cybersecurity awareness fair to educate employees on threats and countermeasures as protecting sensitive customer data is critical. The document stresses the importance of user awareness and cautions staff to not be the weak link in National Life Group's cyber defenses.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
The New York State Department of Financial Services has been closely monitoring this ever-growing threat and has proposed regulations that would require financial services companies to adopt a cybersecurity program to protect their customers, employees, data and operations. Its proposed changes are expected to take effect on March 1, 2017. Financial services companies would have until Feb. 15, 2018, to submit a certificate of compliance with the program. Components of New York's proposed cybersecurity program are outlined in this article.
The document discusses cyber security awareness and promotes self-protection techniques. It outlines goals of promoting awareness, discussing how to secure personal information, and providing examples of protection software. It then discusses common security threats like malware, phishing, and social engineering and offers tools and best practices for protecting against them, including using antivirus software, enabling two-step verification, and employing encryption and VPNs when online.
Using Cloud in an Enterprise EnvironmentMike Crabb
Introduction to the different cloud models that exist and how they can be used in an enterprise level environment. Short discussion on UK DPA and its relevance to cloud computing
Cyber terrorism involves using computers and technology to intimidate or harm people for political or religious goals. It differs from physical terrorism in that there is less risk of being caught and tracked online. Potential cyber terrorists include crackers, white hat hackers, and script kiddies. Factors contributing to cyber terrorism are dependence on technology, lack of security understanding, lack funding for security, and difficulty tracking online criminals. Common cyber attacks include information theft, credit card theft, hacking, and threatening infrastructure. Preventing cyber terrorism requires cooperation between agencies, prioritizing security, and reporting cyber crimes.
Are we near the point of cyber-armageddon or are we simply engaged in a new reality of information security priorities? Are the attacks being discovered daily against private sector and public federal systems somehow unique and new, or are they simply the new reality of cyberspace? Organizations are regularly forced to make difficult decisions about how best to protect their information systems. Executives daily open the newspaper to find another example of effective cyber attacks and hacking. How do organizations know when security mechanisms are enough to keep their data safe? In an effort to answer this question and respond to mounting cyber incidents worldwide, the US federal government has been engaging in numerous efforts to secure cyberspace. But what are they and will they be enough? In this presentation James Tarala, a Senior Instructor with the SANS Institute and a Principal Consultant at Enclave Security, will describe current efforts and the tools being offered to help citizens and protect cyberspace.
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
DDoS attacks have catapulted to the forefront of banking security news after the industry experienced a series of multi-phased attacks beginning back in September of 2012. Hackers launch DDoS attacks prompted by one of two common motives. Protest attacks, like OpUSA, target large, high-profile banks and are often launched for social or political purposes. Attacks on community banks are usually used to as a distraction in conjunction with account takeover attacks. This event is designed to strengthen the awareness and defenses of participants. Jay McLaughlin, this session's presenter, fights cybercrime aimed at financial institutions on a daily basis as Q2ebanking's Chief Security Officer. Jay will break down conceptual and technical aspects of DDoS attack types, clarify the differing attacker motives, and discuss how community banks can build a layered security model to prevent DDoS attacks.
The document provides an after action report summarizing lessons learned from the November 2015 Paris attacks and the 1993 WTC bombing. It discusses how the attacks showed the importance of business continuity planning and an all-hazards approach. Key lessons included the need for physical security, interagency cooperation, and protecting crowded areas from terrorist attacks. The attacks also demonstrated how organizations must have resilient systems to maintain operations during crises.
The document discusses cyber security threats posed by distributed denial of service (DDoS) attacks. It provides background on DDoS attacks, including their origins from hacktivism, cybercrime, and cyber war. It examines the 2011 attacks against major government agencies by the hacktivist group Anonymous. The document explores whether DDoS attacks should be considered a form of protest or a criminal act. It notes that while protection technologies exist, more intelligence, capabilities, and cooperation are still needed to adequately defend against evolving DDoS threats. The presentation concludes by describing Radware's attack mitigation system for providing end-to-end DDoS protection both on-premises and in the cloud.
Anonymous groups in Tunisia launched cyber attacks against government targets to promote internet freedom and transparency. The attacks included distributed denial of service (DDoS) attacks using tools like the Low Orbit Ion Cannon. The Tunisian Computer Emergency Response Team coordinated the national response, activating defense plans and working with internet service providers, telecom companies, and international partners to monitor attacks, analyze logs, develop blacklists of attacking IP addresses, and secure vulnerable systems. Their role was to inform stakeholders and coordinate monitoring, analysis, and sharing of technical information to defend against the attacks.
CS101- Introduction to Computing- Lecture 39Bilal Ahmed
Cyber crime takes many forms such as denial of service attacks, software piracy, viruses, and industrial espionage. DoS attacks involve overloading servers with traffic to render them unusable. Viruses are self-replicating software that infect files and systems. Common defenses include email filtering, intrusion detection, encryption, and antivirus software. Engaging in cyber crimes can result in legal prosecution with jail time and fines.
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemJennifer Nichols
This document discusses DNS security risks and how to better secure DNS infrastructure. It outlines five common DNS attack types, including TCP SYN floods, UDP floods, spoofed source address attacks, cache poisoning attacks, and man-in-the-middle attacks. It argues that general-purpose computers running operating systems like UNIX are not well-suited for DNS servers due to the complexity of securing the OS, difficulty of regularly updating both the OS and DNS software, and risk of compromise via user logins. Instead, it advocates for purpose-built appliances that are easier to secure and update to better prevent DNS attacks.
Cyber warfare involves actions by a nation to penetrate another nation's computers or networks to cause damage or disruption across military, economic, political and social systems. While some experts argue for counterattacks in response to cyber harm, attribution of attacks is challenging due to spoofing of technical data. Existing international law does not fully cover cyber warfare. Other-than-internet attacks using vectors like USB devices or altered hardware present new ethical issues for policymakers seeking to prevent attacks while maintaining legitimacy of responses. A workable international treaty on cyber warfare will likely not be possible for over a decade.
The document appears to be a collection of links to photos on Flickr accompanied by short captions. It discusses the author's interests and experiences in areas such as photography, creative design, music, mechanics, drawing, sculpture, invention, and more. Each section includes 2-3 links to relevant photos on Flickr to illustrate the topic. The overall document provides a high-level overview of the author's background and experiences through short captions accompanying various photo links.
Hacking has evolved over time from a positive term referring to clever programming to taking on a negative connotation of illegal computer access. It now includes spreading viruses/worms, denial of service attacks, and political/hacktivism. The law prohibits unauthorized access and expanded definitions of damage and loss. Law enforcement uses undercover operations, tracking handles, and computer forensics to catch hackers. Penalties depend on intent and damage, with most young hackers receiving probation. Responsibility for security includes developers securing systems, businesses monitoring networks, and users educating themselves.
The document discusses using photoplethysmographic (PPG) signals for biometric recognition. PPG signals are obtained by illuminating the skin and measuring changes in light absorption. Compared to other biometrics, PPG is low-cost, easy to use, and can be accessed from various body sites. The document outlines the process of PPG signal acquisition, pre-processing, time-domain feature extraction using the original and derivative PPG signals, and classification using k-nearest neighbors. PPG signals can also be used to measure heart rate with a pulse oximeter.
The recent batch of mega retailers that have been compromised, including Target, Neiman Marcus and Michaels, has revealed just how vulnerable payment systems are. Even with sophisticated tools, strong security policies, updated regulatory requirements such as PCI v3 and other measures to mitigate these attacks, hackers are still able to compromise the systems by taking advantage of inherent vulnerabilities in payment systems.
In this webcast, payment systems expert Slava Gomzin, author of Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, will show us how retailers such as Target were compromised, what went wrong, failures in PCI to address all vulnerabilities and how these types of breaches can be prevented in the future.
Webcast participants will also receive a free sample chapter of Slava’s book on “Payment Application Architecture,” which provides a detailed overview of how payment systems work, protocols and their weaknesses.
The power of Structured Journalism & Hacker Culture in NPRPoderomedia
A keynote Miguel Paz gave for a brown bag lunch at NPR in April, 2015, organized by the Research, Analysis and Data team of this awesome media organization. While it is focused on NPR most of the ideas apply to other news organizations as well.
The Raspberry Pi is a credit-card sized computer that can perform many of the functions of a desktop computer. It has a 700MHz processor, 512MB of RAM, HDMI and USB ports, and runs Linux-based operating systems from a microSD card. While less powerful than a laptop, the Raspberry Pi provides an inexpensive platform for learning programming through languages like Python and experimenting with electronics. It has found applications as a desktop computer, game console, web server, and more. Later versions of the Raspberry Pi, such as the Raspberry Pi 3, increased processing power while maintaining a low price point.
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
This document discusses common cybersecurity threats such as social engineering, phishing, ransomware, and malware distributed via email. It provides tips to help avoid these threats and emphasizes that cybersecurity requires vigilance from all users as even a single weak link can compromise an entire network. National Life Group holds a yearly cybersecurity awareness fair to educate employees on threats and countermeasures as protecting sensitive customer data is critical. The document stresses the importance of user awareness and cautions staff to not be the weak link in National Life Group's cyber defenses.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
The New York State Department of Financial Services has been closely monitoring this ever-growing threat and has proposed regulations that would require financial services companies to adopt a cybersecurity program to protect their customers, employees, data and operations. Its proposed changes are expected to take effect on March 1, 2017. Financial services companies would have until Feb. 15, 2018, to submit a certificate of compliance with the program. Components of New York's proposed cybersecurity program are outlined in this article.
The document discusses cyber security awareness and promotes self-protection techniques. It outlines goals of promoting awareness, discussing how to secure personal information, and providing examples of protection software. It then discusses common security threats like malware, phishing, and social engineering and offers tools and best practices for protecting against them, including using antivirus software, enabling two-step verification, and employing encryption and VPNs when online.
Using Cloud in an Enterprise EnvironmentMike Crabb
Introduction to the different cloud models that exist and how they can be used in an enterprise level environment. Short discussion on UK DPA and its relevance to cloud computing
Cyber terrorism involves using computers and technology to intimidate or harm people for political or religious goals. It differs from physical terrorism in that there is less risk of being caught and tracked online. Potential cyber terrorists include crackers, white hat hackers, and script kiddies. Factors contributing to cyber terrorism are dependence on technology, lack of security understanding, lack funding for security, and difficulty tracking online criminals. Common cyber attacks include information theft, credit card theft, hacking, and threatening infrastructure. Preventing cyber terrorism requires cooperation between agencies, prioritizing security, and reporting cyber crimes.
1) The document discusses definitions of cyberterrorism since it is a relatively new concept. Cyberterrorism involves unlawful attacks against computers, networks, or stored information to intimidate or coerce for political or social goals.
2) The key factor in determining if an cyber attack is cyberterrorism or just hacking is the intentions and motivations of the attackers - specifically if they have political goals.
3) An example is given of a 14-year-old launching a virus possibly being viewed differently than a terrorist group launching an attack to further specific political objectives by disrupting infrastructure.
The document discusses various web application attacks like cross-site scripting, SQL injection, cross-site request forgery, sensitive data exposure, and cookie editing. For each attack, it provides information on threat agents, attack vectors, security weaknesses, impacts, prevalence, detectability, example exploits, and steps to prevent the attack. The overall document serves as an educational guide on common web hacking techniques and how to avoid falling victim to them.
The UK government is funding a "Fire Kills" campaign to improve fire safety awareness. The campaign aims to communicate six key objectives: plan your escape route, have a backup plan, keep objects away from doors, close internal doors, get out and stay out, and keep keys handy. The document discusses ideas for interactive games and ads targeting school children and Facebook users to educate them about fire safety in an engaging way. It describes a proposed interactive game where players navigate an escape from a fire by completing objectives, with facts appearing if the player "dies". The game would be posted on the Fire Kills website and Facebook to maximize outreach.
Cyber terrorism poses a significant threat to India according to experts. Pakistani cyber criminals deface dozens of Indian websites daily, far more than the number of Pakistani sites defaced in retaliation. While India is an IT leader, it lags behind in cyber security. Cyber terrorism can involve hacking critical infrastructure to harm the public and includes acts that are highly publicized on a large scale. International cooperation and domestic security improvements are needed to address this growing issue.
Cyber security involves protecting computers, networks, programs and data from unauthorized access and cyber attacks. It includes communication security, network security and information security to safeguard organizational assets. Cyber crimes are illegal activities that use digital technologies and networks, and include hacking, data and system interference, fraud, and illegal device usage. Some early forms of cyber crime date back to the 1970s. Maintaining antivirus software, firewalls, backups and strong passwords can help protect against cyber threats while being mindful of privacy and security settings online. The document provides an overview of cyber security, cyber crimes, their history and basic safety recommendations.
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
This document discusses cybersecurity awareness, vulnerabilities, and solutions. It begins by outlining threats to IoT/ICS/SCADA systems from actors like script kiddies, gray hats, black hats, and state-sponsored groups. Common threats include DDoS attacks and exploiting vulnerabilities in device access controls and software updates. The document then examines solutions like developing response and recovery plans, conducting risk assessments, implementing security controls, and obtaining external cybersecurity support. It emphasizes the importance of cybersecurity awareness training, continuous monitoring, and establishing cooperation between organizations.
DOS / DDOS introduction
How Easy it is to get information
Real Life Examples MyDoom , GitHub , Dyn , Windows Server and Windows 10 servers running Internet Information Services (IIS) are vulnerable to denial of service (DOS) attacks
Base of Attacks
Types of DOS / DDOS
Attack Tools , LOIC, XOIC, Stacheldracht
DOS/DDOS Weaknesses
Category of OS/ DDOS
What to defend?
Botnets and Botnets mitigations
Michael Calce, a.k.a. MafiaBoy
Point of entrance / OSI Model ( If time permit)
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
APNIC Senior Security Specialist Adli Wahid spoke on the importance and role of CERTs in helping prevent cyber attacks at the Philippines Cybersecurity Conference 2021, held online from 13 to 29 October 2021.
The Art of Cyber War [From Black Hat Brazil 2014]Radware
With cyber-attacks becoming a growing concern for organizations, availability-based attacks, also known as Denial of Service or Distributed Denial of Service attacks, have long moved from a form of cyber protest to a destructive weapon that is used by cyber criminals, hacktivists and even governments.
In 2013 we saw a growing use of a new type of attack where attackers used legitimate transactions to saturate application servers’ resources. In this presentation, Security Expert Werner Thalmeier demonstrates how such an advanced attack can be created from a laptop running in an anonymous public WiFi network. He also evaluates the attack landscape and its impact on organizations as well as shares the best practices to protect against such cyber-attacks.
Understand the current availability-based threat landscape and learn about new types of cyber-attacks that are being used to saturate resources. For more information on the state of Application and Network Security, please visit: http://www.radware.com/ert-report-2013/
This document discusses cyber attacks and defense strategies. It analyzes DDoS attacks and motivations for cyber attacks such as political, social, business, and personal reasons. It examines cyber warfare cases involving Afghanistan and China. The US, Russia, China, Iran and North Korea are compared in terms of their cyber offense, dependence and defense capabilities. Botnets, bot markets, and math calculations are reviewed to understand the economics of DDoS attacks. Finally, defensive strategies are proposed such as firewall rules, protocol rate limiting, and developing unique algorithms to defend against unique attack patterns.
This document discusses cyber attacks and defense strategies. It analyzes DDoS attacks and motivations for cyber attacks such as political, social, business, and personal reasons. Case studies on cyber warfare in Afghanistan and China are presented. The document also discusses the economics of botnets and math examples of DDoS attack scenarios. Proposed defense strategies include firewall rules and policies, rate limiting, and designing unique algorithms to defend against unique attack patterns.
The document discusses global cyber threats, including threats from hackers, hacktivists, organized crime groups, foreign governments like China, and cyber terrorists. It notes that thousands of systems are compromised daily, national critical assets and global economic stability are at risk, and the internet's root servers face daily attacks. The threats have grown due to increasing dependencies on technology and connectivity.
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Codero
Codero is an Infrastructure-as-a-Service provider that offers dedicated, cloud, managed and hybrid hosting services to over 3,400 domestic and international customers from three data center locations. We are at an interesting vantage point where we see all sorts of interesting things – this presentation will focus as a ‘report from the field’ related to cybersecurity from our position.
When you're at the edge, speed, security, and server health cannot be an afterthought. In this session, Cloudflare’s VP of Product Sergi Isasi and Pavan Tirupati, Product Manager from WP Engine will discuss why having an edge-first mentality is essential to the success of each website you build or maintain.
This document discusses techniques for advanced protection against distributed denial-of-service (DDoS) attacks. It begins by asking questions about knowing the latest DDoS attack trends, best mitigation practices, and the real impact of attacks. It then discusses how easy it is to launch DDoS attacks and the complexity of modern multi-vector attacks. Specific examples of DDoS attacks are provided, such as a 2018 attack against Dutch banks, and how every physical or geopolitical event has a corresponding cyber reflection. The document promotes Arbor Networks as the industry leader in DDoS protection and describes their hybrid DDoS mitigation approach using on-premise and in-cloud/operator solutions.
DNS is critical network infrastructure and securing it against attacks like DDoS, NXDOMAIN, hijacking and Malware/APT is very important to protecting any business.
Ransomware like CryptoLocker encrypts victims' files and demands ransom payments in bitcoin to decrypt them. CryptoLocker was very successful, infecting over 250,000 systems in 100 days and accumulating $380,000 in ransoms. It used strong encryption methods and hid its malicious nature. Experts predict ransomware will increasingly target mobile devices, cloud services, and use new techniques like cross-platform code. Reducing risks involves frequent backups, security updates, strong antivirus, and caution opening unknown files.
Nominum 2016 Fall Data Revelations Security ReportYuriy Yuzifovich
The document provides an analysis of cybersecurity threats based on examining over 100 billion DNS queries per day over a 6 month period. Some key findings include:
- Malicious DNS queries and domains tripled over the period, driven by increased botnet activity, particularly from the Necurs botnet.
- Approximately 5 million new domains are generated daily, with 75% receiving only 1 query, indicating they are likely generated maliciously by domain generation algorithms (DGAs) for command and control of botnets and malware.
- The "Razzie Awards" are given to the worst cyberthreats of 2016, with the Necurs botnet receiving the "Botnet Award" as one of the world
Nominum Data Science Security Report, Fall 2016Brian Metzger
Nominum’s “Data Revelations” analyzes some of the biggest cyberthreats impacting organizations and individuals today, including ransomware, DDoS, mobile malware and IoT-based attacks. Since DNS is the launch point for over 90% of cyberattacks, it offers a superior vantage point from which to examine, understand, thwart and proactively prevent threats. By applying machine learning, artificial intelligence, natural language processing and neural networks, Nominum Data Science is able to predict and prevent some of the most sophisticated and dangerous cyberthreats to ever hit the internet.
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24
We explain how best to identify security gaps through threat intelligence to get essential warning of impending ransomware threats targeting your organization.
Qrator and Wallarm 2016 State of Network Security report is dedicated to the main events and strong trends in the network security industry. Particular attention is payed to the DDoS, Internet infrastructure, hacks and vulnerabilities in software and hardware, like connected devices.
Network and Application Security 2017. Prediction 2017Wallarm
rator and Wallarm 2016 State of Network Security report is dedicated to the main events and strong trends in the network security industry.
Particular attention is paid to the DDoS, internet infrastructure, hacks and vulnerabilities in software and hardware, like connected devices.
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...TI Safe
Critical infrastructure is increasingly being targeted by ransomware attacks and hacking, which have evolved from purely financially motivated crimes to acts of terrorism in some cases. A holistic approach is needed to address cybersecurity across both information technology and operational technology systems. Recent high-profile ransomware attacks have caused widespread disruptions by targeting critical infrastructure providers like the Colonial Pipeline and meat processor JBS. These attacks highlight the growing dangers posed by ransomware to critical industries and underscore the importance of proper cybersecurity policies, monitoring, and backups.
The security experts from Cloudflare and WP Engine help you navigate the security landscape for your web infrastructure.
Register to watch the on-demand webinar: https://hs.wpengine.com/webinar-securing-web-infrastructure
Cyber Security Through the Eyes of the C-Suite (Infographic)Radware
The document summarizes the findings of a survey of 200 IT executives in the US and UK about how their companies are responding to ransom-based cyber attacks. It reports that UK executives are less willing to pay ransoms than US executives, with only 9% of UK executives saying they would pay versus 23% in the US. Over half of UK businesses have invited or are open to inviting hackers to assess their cyber security. On average, ransoms demanded of UK companies are higher at £22,000 compared to $7,500 in the US. Executives who have not experienced an attack are less likely to say they would pay a ransom compared to those who have already been attacked.
What’s the Cost of a Cyber Attack (Infographic)Radware
How much does a cyber-attack actually cost an organization in hard dollars? What are the potential business impacts? This infographic answers these questions and more via two surveys Radware recently conducted of IT professionals.
DDoS Threat Landscape - Ron Winward CHINOG16Radware
- DDoS attacks continue to grow in complexity and now utilize multi-vector attacks across all layers of the infrastructure. The top failure points for networks are internet pipe saturation and stateful firewalls.
- Common attack types include UDP, ICMP, reflection attacks, TCP weaknesses like SYN floods, low and slow attacks like Slowloris, and encrypted attacks such as HTTPS floods. Anonymous hacking tools enable these attacks.
- Successful mitigation of DDoS attacks requires proactive preparation across the network, including a hybrid solution of on-premise and cloud-based detection and mitigation, emergency response planning, and a single point of contact during attacks.
Radware provides cloud-based web application firewall (WAF) and distributed denial of service (DDoS) protection services to help organizations address evolving security threats. The services use Radware's security technologies and are fully managed by Radware security experts. The WAF service provides continuously adaptive protection against known and unknown attacks. The DDoS service offers over 2Tbps of mitigation capacity and has protected organizations from large multi-vector DDoS campaigns. Both services are designed to provide strong security with minimal management requirements.
The enterprise perimeter is disappearing. Migration to the cloud means a more distributed network infrastructure. Transition of web based applications to the cloud renders on premise mitigation tools ineffective against web attacks and requires organizations to protect applications both on premise and in-the-cloud.
Introducing Radware's Hybrid Cloud WAF Service - a fully-managed, always on service that integrates cloud-based with on premise protection against a broad range of attack vectors.
Visit here http://www.radware.com/social/hybridcloudwaf/ to read "The Dawn of Hybrid Cloud WAF" and to learn how the industry's first hybrid cloud-based WAF service addresses today's most challenging web-based cyber-attacks.
The Expanding Role and Importance of Application Delivery Controllers [Resear...Radware
When it Comes to ADCs, Perception is Not Reality.
The Enterprise Strategy Group and Radware recently conducted a collaborative research project about the current use and future strategies of application delivery controllers (ADCs).
Based on a survey of 243 IT professionals, the research reveals that the role of ADCs has expanded well beyond the historical perception of hardware-based load balancers.
What’s most interesting is that ADCs are becoming a critical component of a defense-in-depth security strategy as enterprises fine-tune security policy and enforcement to align with their sensitive business applications. Organizations are also deploying ADCs as virtual appliances at an increasing rate and taking advantage of ADC functionality from the network through the application layer.
There is a lesson to be learned here: enterprise organizations can get creative with ADC deployments for performance tuning, application-specific services, and critical system protection. Read this research http://www.radware.com/social/esg-adc-research/ to understand the benefits of applying ADCs in this fashion.
Eventually, every website fails. If it's a household-name site like Amazon, then news of that failure gets around faster than a rocket full of monkeys. That's because downtime hurts. As a for-instance, in 2013 Amazon suffered a 40-minute outage that allegedly cost the company $5 million in lost sales. That's a big number, and everybody loves big numbers.
But when it comes to performance-related losses, is it the biggest number?
In this presentation from the CMG Performance and Capacity 2014 conference, Radware Web Performance Expert Tammy Everts reviews real-world examples that compare the cost of site slowdowns versus outages. We also talk about how to overcome the challenges of creating as much urgency around the topic of slow time as there is around the topic of downtime.
The Cyber Attack landscape is evolving with new attack vectors and dangerous trends that can affect the security of your business. Some attacks can take only minutes to complete, yet months to be discovered.
Determine your attack risk and learn what to look for in a quality cyber attack defense.
Please visit here: http://www.radware.com/social/amn/ for information on Radware's AMN (Attack Mitigation Network.
The document summarizes the Shellshock vulnerabilities (CVE-2014-6271, CVE-2014-7169) that affect Bash and allow remote code execution. It provides background on the vulnerabilities, risk level, mitigation options including IPS signatures, and recommendations to patch vulnerable systems. Contact information is also included.
Mobile Web Stress: Understanding the Neurological Impact of Poor PerformanceRadware
Slow pages hurt mobile user metrics, from bounce rate to online revenues and long-term user retention. At Radware, we wanted to understand the science behind this, so we engaged in the first documented study of the neurological impact of poor performance on mobile users. Your takeaway from this presentation is hard data that you can use to make a case for investing in mobile performance in your organization.
Based on similar research performed on desktop users, our study involved using a groundbreaking combination of eyetracking and electroencephalography (EEG) technologies to monitor brain wave activity in a group of mobile users who were asked to perform a series of online transactions via mobile devices.
In our study, participants were asked to complete standardized shopping tasks on four ecommerce sites while using a smartphone. We studied participants during these tasks, both at the normal speed over Wifi and also at a consistently slowed-down speed (using software that allowed us to create a 500ms network delay). The participants did not know that speed was a factor in the tests; rather, they believed that they were participating in a generic usability/brand perception study. From the data, we were able to extract measures of frustration and emotional engagement for the browsing and checkout stages of both the normal and slowed-down versions of all four sites.
This presentation, shared by Radware Web Performance Evangelist Tammy Everts at the 2014 Velocity Conference and the CMG Performance and Capacity 2014 Conference, provides a deeper understanding of the impact of performance on mobile users.
For even more on the research, you can also download it here: http://www.radware.com/mobile-eeg2013/
This is your brain.
This is your brain on a mobile site with throughput throttled just enough to frustrate the heck out of you.
This is your brain thinking about all the tests you could run if you had your own lightweight, wireless EEG braincap to directly but passively monitor brain activity in your customers as they interact with your digital assets.
From the eMetrics Conference in Chicago, Radware Evangelist Tammy Everts describes a mobile web stress test conducted to gauge the impact of network speed on emotional engagement and brand perception. Neural marketing has escaped the lab and has found its way into practical applications. For even more on the web stress tests, please visit: http://www.radware.com/mobile-eeg2013/
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
With cyber-attacks becoming a growing concern for organizations, availability-based attacks, also known as Denial of Service or Distributed Denial of Service attacks, have long moved from a form of cyber protest to a destructive weapon that is used by cyber criminals, hacktivists and even governments.
In 2013 we saw a growing use of a new type of attack where attackers used legitimate transactions to saturate application servers’ resources. In this presentation, Security Expert Werner Thalmeier demonstrates how such an advanced attack can be created from a laptop running in an anonymous public WiFi network. He also evaluates the attack landscape and its impact on organizations as well as shares the best practices to protect against such cyber-attacks.
Understand the current availability-based threat landscape and learn about new types of cyber-attacks that are being used to saturate resources. For more information on the state of Application and Network Security, please visit: http://www.radware.com/ert-report-2013/
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...Radware
Why would you want to have an open source driver?
Samuel Bercovici, Radware's Director of Automation & Cloud Integration, answers this and offers an introduction to Drivers in Havana in this presentation from his recent appearance at OpenStack Israel.
Read more in our Press Release: http://www.radware.com/NewsEvents/PressReleases/Radware-Alteon-Provides-Load-Balancing-for-OpenStack-Cloud-Applications/
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
http://www.radware.com/Products/DefenseFlow/
Learn about the industry's first SDN application that enables network operators to program the network to provide DDoS protection as a native network service.
SecureWorld: Information Security Adaption: Survival In An Evolving Threat L...Radware
Carl Herberger’s presentation during his series of SecureWorld events. Carl discusses the evolving threat landscape, the anatomy of an attack and securing tomorrow’s perimeter.
Stock Exchanges in the Line of Fire-Morphology of Cyber AttacksRadware
Stock exchanges are constantly targeted by cyber attacks. This presentation discusses several real life attacks cases studies discussing attack vectors, motivations, impacts and mitigation techniques.
Attackers Vs. Defenders: Restoring the EquilibriumRadware
This document summarizes key findings from Radware's 2012 Global Security Report. It discusses rising DDoS attack frequencies, durations, and costs to organizations. While organizations invest in security, most efforts are before and after attacks, not during. As a result, attackers are able to evade defenses by prolonging attacks and varying techniques. The document also examines recent large-scale DDoS attacks against US banks and how attackers exploited network vulnerabilities. It recommends organizations acquire capabilities to sustain long, complex attacks by deploying on-premise and cloud-based mitigation solutions and carefully planning network architectures.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungenpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-und-verwaltung-von-multiuser-umgebungen/
HCL Nomad Web wird als die nächste Generation des HCL Notes-Clients gefeiert und bietet zahlreiche Vorteile, wie die Beseitigung des Bedarfs an Paketierung, Verteilung und Installation. Nomad Web-Client-Updates werden “automatisch” im Hintergrund installiert, was den administrativen Aufwand im Vergleich zu traditionellen HCL Notes-Clients erheblich reduziert. Allerdings stellt die Fehlerbehebung in Nomad Web im Vergleich zum Notes-Client einzigartige Herausforderungen dar.
Begleiten Sie Christoph und Marc, während sie demonstrieren, wie der Fehlerbehebungsprozess in HCL Nomad Web vereinfacht werden kann, um eine reibungslose und effiziente Benutzererfahrung zu gewährleisten.
In diesem Webinar werden wir effektive Strategien zur Diagnose und Lösung häufiger Probleme in HCL Nomad Web untersuchen, einschließlich
- Zugriff auf die Konsole
- Auffinden und Interpretieren von Protokolldateien
- Zugriff auf den Datenordner im Cache des Browsers (unter Verwendung von OPFS)
- Verständnis der Unterschiede zwischen Einzel- und Mehrbenutzerszenarien
- Nutzung der Client Clocking-Funktion
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
Procurement Insights Cost To Value Guide.pptxJon Hansen
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement — not a competitor — to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
4. The Security Trinity
Integrity
Availability
Confidentiality
Security Confidentiality,
a mainstream adaptation of the
“need to know” principle of the
military ethic, restricts the
access of information to those
systems, processes and
recipients from which the
content was intended to be
exposed.
Security Integrity
in its broadest meaning refers
to the trustworthiness of
information over its entire
life cycle.
Security Availability
is a characteristic that distinguishes information objects
that have signaling and self-sustaining processes from
those that do not, either because such functions have
ceased (outage, an attack), or else because they lack such
functions .
5. Availability Based Attacks
Slide 5
Availability-
based Threats
Network Floods
(Volumetric)
Application
Floods
Low-and-Slow
Single-packet
DoS
14. Overview
• What triggered the recent US attacks?
• Who was involved in implementing the attacks and name of the operation?
• How long were the attacks and how many attack vectors were involved?
• How the attacks work and their effects.
• How can we prepare ourselves in the future?
Slide 14Radware Confidential Jan 2012
15. What triggered the attacks on the US banks?
• Nakoula Basseley Nakoula (Alias- “Sam Bacile”), an Egyptian born US resident
created an anti-Islamic film.
• Early September the publication of the „Innocence of Muslims‟ film on YouTube
invokes demonstrations throughout the Muslim world.
• The video was 14 minutes though a full length movie was released.
Slide 15Radware Confidential Jan 2012
18. Who is the group behind the cyber response?
• A hacker group called “Izz as-Din al-Qassam Cyber fighters”.
• Izz as-Din al-Qassam was a famous Muslim preacher who was a leader in the
fight against the French, US and Zionist in the 1920‟s and 1930‟s.
• The group claims not to be affiliated to any government or Anonymous.
• This group claims to be independent, and it‟s goal is to defend Islam.
Slide 18Radware Confidential Jan 2012
19. Operation Ababil launched!
• “Operation Ababil” is the codename of the operation launched on September
18th 2012, by the group Izz as-Din al-Qassam Cyber fighters
• The attackers announced they would attack “American and Zionist targets.”
• “Ababil” translates to “Swallow” from Persian. Until today the US thinks the
Iranian government may be behind the operation.
• The goal of the operation is to have YouTube remove the anti-Islamic film from
its site. Until today the video has not been removed.
Slide 19Radware Confidential Jan 2012
21. Initial attack campaign in 2 phases
• The attack campaign was split into 2 phases, a pubic announcement was made in each phase.
• The attacks lasted 10 days, from the 18th until the 28th of September.
• Phase 1 - Targets > NYSE, BOA, JP Morgan.
• Phase 2 – Targets > Wells Fargo, US Banks, PNC.
• Phase 3 - Targets > PNC, Fifth Third Bancorp, J.M.Chase, U.S.Bank, UnionBank, Bank of
America, Citibank, BB&T and Capitalone.
Slide 21Radware Confidential Jan 2012
22. Attack Vectors
• 5 Attack vectors were seen by the ERT team during Operation Ababil.
1. UDP garbage flood.
2. TCP SYN flood.
3. Mobile LOIC (Apache killer version.)
4. HTTP Request flood.
5. ICMP Reply flood. (*Unconfirmed but reported on.)
6. Booters.
*Note: Data is gathered by Radware as well as it‟s partners.
Radware Confidential Jan 2012
23. Booters
Slide 23
A Booter is a tool used for taking down/booting off
websites and servers.
Booters introduce high volumetric (server based) attacks
and slow-rate attack vectors as a one stop shop.
24. UDP Garbage Flood
• Targeted the DNS servers of the organizations, also HTTP.
• 1Gb + in volume.
• All attacks were identical in content and in size (Packet structure).
• UDP packets sent to port 53 and 80.
• Customers attacked Sep 18th and on the 19th.
Slide 24Radware Confidential Jan 2012
25. Tactics used in the UDP Garbage Flood
• Internal DNS servers were targeted , at a high rate.
• Web servers were also targeted, at a high rate.
• Spoofed IP‟s (But kept to just a few, this is unusual.)
• ~ 1Gbps.
• Lasted more than 7 hours initially but still continues...
Packet structure
Slide 25
Parameter Value Port 53 Value Port 80
Packet size 1358 Bytes Unknown
Value in Garbage ‘A’ (0x41) characters
repeated
“/http1”
(x2fx68x74x74x70x
31) - repetitive
Radware Confidential Jan 2012
26. DNS Garbage Flood packet extract
• Some reports of a DNS reflective attack was underway seem to be incorrect.
• The packets are considered “Malformed” DNS packets, no relevant DNS
header.
Slide 26Radware Confidential Jan 2012
27. Attackers objective of the UDP Garbage Flood
• Saturate bandwidth.
• Attack will pass through firewall, since port is open.
• Saturate session tables/CPU resources on any state -full device, L4 routing
rules any router, FW session tables etc.
• Returning ICMP type 3 further saturate upstream bandwidth.
• All combined will lead to a DoS situation if bandwidth and infrastructure cannot
handle the volume or packet processing.
Slide 27Radware Confidential Jan 2012
28. TCP SYN Flood
• Targeted Port 53, 80 and 443.
• The rate was around 100Mbps with around 135K PPS.
• This lasted for more than 3 days.
Slide 28Radware Confidential Jan 2012
29. SYN Flood Packet extract
Slide 29
-All sources are spoofed.
-Multiple SYN packets to port 443.
Radware Confidential Jan 2012
30. Attackers objective of the TCP SYN Floods
• SYN floods are a well known attack vector.
• Can be used to distract from more targeted attacks.
• The effect of the SYN flood if it slips through can devastate state-full devices
quickly. This is done by filling up the session table.
• All state-full device has some performance impact under such a flood.
• Easy to implement.
• Incorrect network architecture will quickly have issues.
Slide 30Radware Confidential Jan 2012
31. Mobile LOIC (Apache killer version)
• Mobile LOIC (Low Orbit Iron Cannon) is a DDoS tool written in HTML and
Javascript.
• This DDoS Tool does an HTTP GET flood.
• The tool is designed to do HTTP floods.
• We have no statistics on the exact traffic of mobile LOIC.
Slide 31
*Suspected*Suspected
Radware Confidential Jan 2012
32. Mobile LOIC in a web browser
Slide 32Radware Confidential Jan 2012
33. HTTP Request Flood
• Between 80K and 100K TPS (Transactions Per second.)
• Port 80.
• Followed the same patterns in the GET request (Except for the Input
parameter.)
• Dynamic user agent.
Slide 33Radware Confidential Jan 2012
34. HTTP flood packet structure
• Sources worldwide (True sources most likely hidden.)
• User agent duplicated.
• Dynamic Input parameters.
GET Requests parameters
Slide 34Radware Confidential Jan 2012
35. Attackers objective of the HTTP flood
• Bypass CDN services by randomizing the input parameter and user agents.
• Because of the double user agent there was an flaw in the programming behind
the attacking tool.
• Saturating and exhausting web server resources by keeping session table and
web server connection limits occupied.
• The attack takes more resources to implement than non connection orientated
attacks like TCP SYN floods and UDP garbage floods. This is because of the
need to establish a connection.
Slide 35Radware Confidential Jan 2012
38. Availability-based Threats Tree
Slide 38
Availability-
based Threats
Network Floods
(Volumetric)
Application
Floods
Low-and-Slow
Single-packet
DoS
UPD
Flood
ICMP
Flood
SYN
Flood
Web
Flood
DNS SMTP
HTTPS
Radware Confidential Jan 2012
42. HTTPS – SSL Re Negotiation Attack
Slide 42
THC-SSL DoS
THC-SSL DOS was developed by a hacking group called The Hacker‟s Choice (THC), as a proof-
of-concept to encourage vendors to patch a serious SSL vulnerability. THC-SSL-DOS, as with other
“low and slow” attacks, requires only a small number of packets to cause denial-of-service for a
fairly large server. It works by initiating a regular SSL handshake and then immediately requesting
for the renegotiation of the encryption key, constantly repeating this server resource-intensive
renegotiation request until all server resources have been exhausted.
Radware Confidential Jan 2012
43. Low & Slow
Slide 43
Availability-
based Threats
Network Floods
(Volumetric)
Application
Floods
Low-and-Slow
Single-packet
DoS
UPD
Flood
ICMP
Flood
SYN
Flood
Web
Flood
DNS SMTP
HTTPS
Low-and-Slow
Radware Confidential Jan 2012
45. R.U.D.Y (R-U-Dead-Yet)
Slide 45
R.U.D.Y. (R-U-Dead-Yet?)
R.U.D.Y. (R-U-Dead-Yet?) is a slow-rate HTTP POST (Layer 7) denial-of-service tool created by Raviv Raz and
named after the Children of Bodom album “Are You Dead Yet?” It achieves denial-of-service by using long form
field submissions. By injecting one byte of information into an application POST field at a time and then
waiting, R.U.D.Y. causes application threads to await the end of never-ending posts in order to perform processing
(this behavior is necessary in order to allow web servers to support users with slower connections). Since
R.U.D.Y. causes the target webserver to hang while waiting for the rest of an HTTP POST request, by initiating
simultaneous connections to the server the attacker is ultimately able to exhaust the server‟s connection table and
create a denial-of-service condition.
Radware Confidential Jan 2012
46. Slowloris
Slide 46
Slowloris
Slowloris is a denial-of-service (DoS) tool developed by the grey hat hacker “RSnake” that causes DoS by using a very slow
HTTP request. By sending HTTP headers to the target site in tiny chunks as slow as possible (waiting to send the next tiny
chunk until just before the server would time out the request), the server is forced to continue to wait for the headers to
arrive. If enough connections are opened to the server in this fashion, it is quickly unable to handle legitimate requests.
Slowloris is cross-platform, except due to Windows’ ~130 simultaneous socket use limit, it is only effective from UNIX-based
systems which allow for more connections to be opened in parallel to a target server (although a GUI Python version of
Slowloris dubbed PyLoris was able to overcome this limiting factor on Windows).
Radware Confidential Jan 2012
47. Radware Security Products Portfolio
Slide 47
AppWall
Web Application Firewall (WAF)
DefensePro
Network & Server attack prevention device
APSolute Vision
Management and security reporting &
compliance
#5: Radware breaks down the security model into three categories: Confidentiality, Integrity and Availability.Think of it as follows:Confidentiality: A compromise here results in the theft or destruction of business-critical information or customer dataIntegrity: Often linked to confidentiality but damage to a businesses systems obviously can have a major impact. An extreme example that you might have heard of would be the Stuxnet virus that was designed to damage the centrifuge machines used in Iran to purify nuclear material.Availability: The ability for your business to operate. Denial of Service attacks target this dimension – designed purely to disrutp business operation.
#6: Here we have the 4 Primary Categories of Availability Based Threats, Network & Application Floods, Low & Slow and Single Packet DOS. The pie charts below illustrate actual use of these attack vectors based on ERT Case history. Over the past few years Application layer attacks have become a significant threat, with Web/SSL and DNS being the fast growing vectors.
#7: Based on the Radware Global Security Survey of the industry 57% of attacks have unknown motive. 22% of attacks have an ideological/hacktivist motive.
#8: 80% of respondents believe they are not protected and businesses will be impacted by DDOS attacks.
#9: While Gaming, Ecommerce maintain risk. Government,Financial Institutions take the biggest shift toward bullseye! These are VERY Likely targets for 2013.
#10: Attack Campaigns are becoming more and more persistent, with 23% of attacks lasting more than one week!
#11: Shift from 2 Security Phases to 3Pre Attack – audit, vuln scanning, pen tests, etc.Post Attack - forensics, process adjustments, preparation, etc.NEW Phase Cyber War Room24/7Trained under fire (war games, etc)Coverage
#15: We are going to take a look at the attacks on the US Banks. We’ll review the attack source, motivation, duration, attack vectors and preparation.
#16: -This pic is from the very beginning of the video, stating “There is an angry mob in the middle of the street”*Notes - On September 9, 2012, an excerpt of the YouTube video was broadcast on Al-Nas TV, an Egyptian Islamist television station.[11][12]Demonstrations and violent protests against the film broke out on September 11 in Egypt and spread to other Arab and Muslim nations and some western countries.
#17: -Libyan riots top left - http://www.foreignpolicy.com/articles/2012/09/14/why_the_embassy_riots_wont_stop.-Lebonon riots bottom left - http://au.ibtimes.com/articles_slideshows/384606/20120915/lebanon-protesters-destroy-kentucky-fried-chicken-and-hardees-over-innocence-of-muslims-film-photos.htm
#19: Links about Izz as-Din al-Quassam The preacher - http://en.wikipedia.org/wiki/Izz_ad-Din_al-Qassam *Notes - The Levant includes most of modern Lebanon, Syria, Jordan, State of Palestine, Israel, Cyprus, Hatay Province of Turkey, some regions of northwestern Iraq and theSinai Peninsula.Links about the Cyber hacker group - http://www.globalpost.com/dispatches/globalpost-blogs/the-grid/who-are-the-izz-ad-din-al-qassam-cyber-fightershttp://www.ehackingnews.com/2012/12/izz-ad-din-al-qassam-cyber-fighters.htmlPic from - http://www.standupamericaus.org/terror-jihad/cyber-fighters-of-izz-al-din-al-qassam-alert-to-banks-in-usa/
#20: Claim to have no current ties to Anonymous Collective nor any Nation State.Goal is to have the Anti-Muslim Video taken off of YouTubeAbabil (Persian) translates to Swallow Links for translation of ababil - http://en.wikipedia.org/wiki/Ghods_AbabilThe pic from - http://en.wikipedia.org/wiki/File:Hirundo_abyssinica.jpgClaims of Iranian involvement -http://betabeat.com/2012/09/iran-possibly-behind-operation-ababil-cyber-attacks-against-financial-institutions/http://features.rr.com/article/0coOckreSy1vL?q=Bank+of+America
#21: Pic taken from - http://news.yahoo.com/americas-failing-grade-cyber-attack-readiness-153640058--abc-news-topstories.html
#22: Data taken from internal doc.Phase 3 OpAbabil – Announced March 5th (ongoing) and expected to last 11 weeks. While Phase 3 is not in my presentation today . Encrypted Attacks are a BIG problem for the current protection in place.
#27: Reflective attack - Attackers send forged requests of some type to a very large number of computers that will reply to the requests. Using spoofed SRC IP’s of the victim, which means all the replies will go to (and flood) the target.
#28: -Stateful inspection in the DNS area is limited. Was in smartdefense at CP, but how many people use it?-The server is forced to respond with ICMP packets “Destination Unreachable” (ICMP type3 Code 3) for port closed when udp packet arrives.-Returning ICMP type 3 further saturate (Packet size in return will be close to received packet).
#31: -The SYN flood attack simply sends a high rate of SYN’s with spoofed IP’s and the server is left waiting for the ACK.-This means the attacker needs much fewer hosts to exhaust target machine because no session is actually kept alive on the “Attackers” side.-You exhaust the Backlog of the TCP stack (Linux default is 3mins and Win2k is 45 sec. for half open timeouts, these can be changed). So the server can no longer accept a new connection.-
#32: -Another reported attack technique that was allegedly used during this campaign is a custom version of the Mobile LOIC tool (aka Mobile LOIC - Apache Killer) which is designed to exploit a known vulnerability in Apache servers – corresponding to CVE-2011-3192.-This attack tool targets Apache servers using Apache HTTP server versions 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19.
#33: Target URL- Specifies the URL of the attacked target. Must start with http://. Requests per second-Specifies the number of desired requests to be sent per second. Append message-Specifies the content for the “msg” parameter to be sent within the URL of HTTP requests
#35: -This value is unique since it seems to contain a typo which is caused by placing the “User Agent:” string inside the user agent value itself.Resource internal.
#40: Trend toward assymetricatacks with obvious reason. The attacker is required to utilize few resources while exhausting the target by sending small requests which result in large and or cpu intensive replies.
#42: Identification: referrer (ask the audience)Iframe attack can be used to amplify a DDoS any site. For example, using the attack LOIC iframe (JavaScript) to amplify the attack.
#46: RUDY or ARE YOU DEAD YET exploits the HTTP POST method by sending POST with long form field submission. It injects one byte of data then waiting causes application threads to await for never ending posts to perform processing.
#47: Slowloris sends very slow HTTP Requests. The HTTP headers ares sent in tiny chunks as slowly as possible while the server si forced to wait for the headers to arrive. This causes many connections to be built up on the target server. Slowloris is cross platform, except for Windows due to a socket limitation (~130). Pyloris was developed to enable running on windows with a Python GUI).