Security researchers have discovered a vulnerability in a top DDoS attack tool that provides a handy means to neutralise onslaughts.
The Dirt Jumper Distributed-Denial-of-Service (DDoS) Toolkit is one of the most popular attack tools available. It was deployed in a digital siege against security news website KrebsonSecurity.com among many, many other victims in recent months. The weapon works by instructing an army of compromised computers to flood a website with traffic until legitimate visitors are unable to connect.
Swiss researcher Pedro Pinto and his colleagues at École Polytechnique Fédérale de Lausanne suggest using the Sparse Interference algorithmPDF to make tracking down the origins of internet threats more efficient. Until now, institutions such as the US National Security Agency (NSA) have used brute force methods to search for the sources of epidemic threats (malware, worms, trojans, internet rumours) in complex networks – but scanning all potentially affected network nodes or address spaces requires a lot of time and resources.
Hackers who spent their teen years phone-phreaking -- breaking into telephone networks and making free calls -- have created their own GSM network at Defcon and are using creative and silly apps on highly customized Android phones.
Monday, 9 July, was supposed to be 'Internet Doomsday' when the US' Federal Bureau of Investigation (FBI) was to shut down servers associated with the DNSChanger malware. As a result, computers infected with this threat were to be cut off from the Internet.
US authorities have officially cut off servers in New York put in place to direct internet traffic for computers infected with the DNSChanger malware.
But concerns around a potential internet blackout for an estimated 211,000 computers still believed to be infected at the time of the shut down were ultimately unfounded. Approximately 6000 Australian internet subscribers faced a similar fate locally, with the majority sourced to Telstra connections.