Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Iran blamed for cyber onslaught on US banks
by Staff Writers
San Francisco (AFP) Jan 9, 2013


Iran denies behind cyber attacks on US banks
Tehran (AFP) Jan 11, 2013 - Iran has denied US media reports it carried out cyber attacks on US banks, the official IRNA news agency said Friday, quoting a statement from Tehran's UN mission.

"The Islamic republic of Iran categorically denies any involvement in cyber attacks on American banks and denounces such methods which are a violation of the sovereignty of nations," the statement said.

US media reported Wednesday that American financial institutions are being pounded with high-powered cyber attacks that some suspect are being orchestrated by Iran as payback for political sanctions.

"There is no doubt within the US government that Iran is behind these attacks," James Lewis, a former official in the state and commerce departments and now a computer security expert at the Centre for Strategic and International Studies, told the New York Times.

While the identities of those behind the online onslaught officially remain a mystery, it was clear they were using a potent new weapon for slamming bank websites with overwhelming numbers or requests for information, reports said.

The top 20 US banks were hit on Wednesday with a third wave of attacks, each of which has been preceded by a claim of responsibility by a group calling itself Izz ad-Din al-Qassam Cyber Fighters.

The attacks began in September last year, according to Radware, which specializes in commercial computer security and has been investigating the cyber assaults.

John Bumgarner of the US Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, cautioned against rushing to assign blame for the attacks.

"These attackers are using the anonymity of the cyber space to mask who they are," Bumgarner said. "There is not irrefutable evidence that the Iranian government was responsible."

US financial institutions are being pounded with high-powered cyber attacks that some suspect are being orchestrated by Iran as payback for political sanctions.

"There is no doubt within the US government that Iran is behind these attacks," James Lewis, a former official in the state and commerce departments and now a computer security expert at the Center for Strategic and International Studies, told the New York Times.

While the identities of those behind the online onslaught officially remain a mystery, it was clear they were using a potent new weapon for slamming bank websites with overwhelming numbers or requests for information.

The attackers infected datacenters used to host services in the Internet "cloud" and commandeered massive computing power to back distributed denial of service (DDoS) attacks, according to security experts.

DDoS attacks have been a basic hacker weapon for quite some time, but they have typically involved using armies of personal computers tainted with viruses and coordinated to make simultaneous requests at targeted websites.

"They are essentially going from a pistol to a cannon," Radware vice president of security solutions Carl Herberger said of cyber attackers using datacenters. "That was one major achievement."

The top 20 US banks on Wednesday were being hit with a third wave of attacks, each of which has been preceded by a claim of responsibility by a group calling itself Izz ad-Din al-Qassam Cyber Fighters.

The attacks began in September of last year, according to Radware, which specializes in commercial computer security and has been investigating the cyber assaults.

"The landscape we are seeing is essentially a persistent industry sector attack that is unprecedented," Herberger said.

"There have been a number of lulls in cyber fighting, with waves concluded and re-launched."

Attackers have shrewdly tailored requests to target encrypted pages or data, which are more complicated to process and therefore tax websites more, according to Radware.

"The world of DDoS is about consuming resources fast; however you can get inside an encrypted algorithm you can multiply your effect," Herberger said. "It is a wonderful tool from a perpetrator's perspective."

Such requests are particularly nefarious because encrypted exchanges are often shielded from security software intended to guard against attacks.

It appeared that no money was taken in the attacks, but Herberger warned that the full extent of the damage had yet to be assessed.

He described how hackers sometimes use DDoS attacks to trigger fail systems that can sometimes allow invaders to get to data.

"I call it the battering ram effect," Herberger said. "They literally batter in the front door; that is a really dark side of this world."

Attacks on banks could also be test runs for assaults on other business sectors or even smart systems controlling vital infrastructure.

"Let's suppose this is state sponsored," Herberger proposed. "Could these not be dry runs? If the banks are permeable what is the likelihood that other systems are?

John Bumgarner of the US Cyber Consequences Unit, a non-profit group that studies the impact of cyber threats, cautioned against rushing to assign blame for the attacks.

"These attackers are using the anonymity of the cyber space to mask who they are," Bumgarner said. "There is not irrefutable evidence that the Iranian government was responsible."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Judge reduces possible sentence for WikiLeaks suspect
Fort Meade (AFP) Maryland (AFP) Jan 8, 2013
A US judge on Tuesday reduced the potential sentence for WikiLeaks suspect Bradley Manning by 112 days because of his harsh treatment at a military jail, where he was held in isolation despite advice from psychiatrists. Judge Denise Lind said the US Army private's detention conditions were "excessive" and at times illegal, going beyond what was needed to ensure his safety and prevent the ris ... read more


CYBER WARS
Mission would drag asteroid to the moon

Russia designs manned lunar spacecraft

GRAIL Lunar Impact Site Named for Astronaut Sally Ride

NASA probes crash into the moon

CYBER WARS
Simulated mission to Mars reveals critical data about sleep needs for astronauts

NASA's Big Mars Rover Makes First Use Of Its Brush

Lockheed Martin Delivered Core Structure For First GOES-R Satellite

Opportunity Scores Another Dust Cleaning Event At Vermillion

CYBER WARS
Simulated Mars mission shows good sleep is critical

2012 in Polish space activities

Captain's log: real space chat for Star Trek crew

Congress Approves Bill Supporting Human Space Exploration

CYBER WARS
Mr Xi in Space

China plans manned space launch in 2013: state media

China to launch manned spacecraft

Tiangong 1 Parked And Waiting As Shenzhou 10 Mission Prep Continues

CYBER WARS
Crew Wraps Up Robonaut Testing

Station Crew Ringing in New Year

Expedition 34 Ready to Ring in New Year

New ISS crew docked at Space Station

CYBER WARS
Arianespace to launch VNREDSat-1A built by Astrium for Vietnam

Arianespace says 2012 sales leapt by 30%

CSF Applauds Passage Of Risk-Sharing Regime Extension For Launch Industry

Rokot Launch Set for January 15

CYBER WARS
NASA's Hubble Reveals Rogue Planetary Orbit For Fomalhaut B

NASA, ESA Telescopes Find Evidence for Asteroid Belt Around Vega

Kepler Gets a Little Help From Its Friends

15 New Planets Hint At "Traffic Jam" Of Moons In Habitable Zone

CYBER WARS
LEON: the space chip that Europe built

Counting the twists in a helical light beam

Oscillating Gel Gives Synthetic Materials the Ability to "Speak"

Cloud computing expands in Latin America




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement