Uncategorized
REPORT: ‘SUSTAINED CYBERATTACK’ CRIPPLED WHITE HOUSE FOR TWO WEEKS
October 29, 2014
0

A “sustained cyberattack” has crippled the White House for at least two weeks or longer, reports the Huffington Post.

The Obama White House confirmed that it “identified activity of concern on the unclassified EOP [Executive Office of the President] network.” The Huffington Post cites sources familiar with the situation as saying that this attack was much more significant than usual cyberattacks and was responsible for “putting the system on the fritz for nearly two weeks, if not longer.”

The White House said it was not in a position to offer details.

However, as the Post notes, “Network outages are not uncommon in the White House, but they typically last no more than a few hours. For the system to be damaged for days on end indicates an attack of significant strength.”

The White House cyberattack revelation comes just weeks after President Barack Obama reportedly told wealthy Democratic donors of a “doomsday” scenario wherein “cyber criminals could literally wipe out the identities of millions of people through some breach of government systems and that could lead to massive chaos,” one person with firsthand knowledge of the meeting told Fox Business.

Source: http://www.breitbart.com/Big-Government/2014/10/29/Report-Sustained-Cyberattack-Crippled-White-House-for-Two-Weeks

DDoS Attack Specialist DDoS Attacks DDoS Protection Specialist Defend Against DDoS
Register for DDoS Protection and Response Strategies Webinar!
October 28, 2014
0

As cyber-criminals innovate and develop new techniques to tackle defensive methods, it has never been more important for information security professionals to have strong, proactive defense and remediation strategies in place. During this webinar, the speakers will share insight on how to address the risks and respond to attacks.

  • Hear about the evolution of and motivations behind DDoS attacks and the attack vectors exploited
  • Discover how to implement multi-layered DDoS defense
  • Identify best practice detection and classification techniques

Discover how to implement resilient DDoS incident response practices

Date: November 12th 2014
Time: 10:00AM EST/15:00 GMT

Click here to register !

DDoS Attack Specialist DDoS Attacks DDoS Protection Specialist
The DDoS Protections Services Landscape
October 27, 2014
0

As the Director of Sales for DOSarrest Internet Security I have the opportunity to speak with many prospects looking for DDoS protection service for their corporate website.

What I have learned is that there are many competitors offering what I would call a “bare bones vanilla offering”.

Some offer free service to service ranging in price from $200 – $300/month. These plans offer a very basic protection. They also advertise an Enterprise offering that has an expense starting point can really turn into being quite costly depending on your circumstances.

The Enterprise service is the offering that any company that is serious about protecting their website should consider. There are a few issues with each of these offerings that I’d like to point out.

These competitors claim they have a very large number of clients utilizing their services but fail to mention that 80-85% of them are using their free service. Roughly 10 -15% of their customers are using their $200-$300/month service which again is really just a basic protection with limited protection capabilities.

When a company witnesses a large attack, which is completely out of their control, they are told they should upgrade to their enterprise offering.  I hear from prospects quite often that this $200 – $300/month service does not offer adequate protection nor customer support.

In most cases there is no phone support included at all! Also they will charge the client based on the size of the attack? How can a client control the size of an attack they are experiencing! This uncertainty makes it virtually impossible for a company to budget costs. Let’s not be mistaken, their goal is to get you onto their Enterprise offering which will cost you in excess of a thousand dollars per month.

Alternately at DOSarrest Internet Security we offer a single Enterprise level service for all of our clients.

The service includes full telephone and email access to our 24/7 support team with our service. This provides you direct access to system experts. We do not operate a tiered support service given the criticality of the service.

Also we protect our clients from all DDoS attacks regardless of size without the need to pay us additional depending on the size of an attack.

We also include an external monitoring account with our service called DEMS which stands for our DOSarrest External Monitoring Service. This allows our 24/7 support team to monitor your website from 8 sensors in 4 geographical regions.

We proactively inform our clients if we notice any issues with their website. Most of our competitors do not offer this service and if they do it is not included free of charge to their clients.

DOSarrest has been providing DDoS protection services since 2007. Globally we were one of the very first DDoS protection providers and have successfully mitigated thousands of real world attacks. This is a not an “add on product” for us. Our team has the experience and the protection of a client’s website is our #1 priority. Please visit our newly revamped website and take a look at the testimonials page to see what some of our current customers are saying about their experience with us.

 

Please feel free to reach out to me directly or anyone on our sales team at sales@dosarrest.com for further information on our service.

Brian Mohammed

Director of Sales for DOSarrest Internet Security LTD.

 

DDoS DDoS Attacks
Hackers Target Ukraine’s Election Website
October 26, 2014
0

KIEV:  Hackers attacked Ukraine’s election commission website Saturday on the eve of parliamentary polls, officials said, but they denied Russian reports that the vote counting system itself had been put out of action.

The www.cvk.gov.ua site, run by the commission in charge of organising Sunday’s election, briefly shut down.

Ukrainian security officials blamed a denial-of-service (DDoS) attack, a method that can slow down or disable a network by flooding it with communications requests.

“There is a DDoS attack on the commission’s site,” the government information security service said on its Facebook page.

The security service said the attack was “predictable” and that measures had been prepared in advance to ensure that the election site could not be completely taken down.

“If a site runs slowly, that doesn’t mean it has been destroyed by hackers,” the statement said.

A report on Russia’s state news agency RIA Novosti quoted a statement on the personal website of the Ukrainian prosecutor general saying that the electronic vote counting system was out of order and that Sunday’s ballots would have to be counted by hand.
The commission spokesman, Kostyantyn Khivrenko, called the RIA Novosti report a “fake”.

“The Central Election Commission will issue preliminary results of the voting with the help of the Vybory information-analytical system. This system is working normally,” he said.

The Ukrainian Security Service (SBU), the country’s lead internal security agency, said that “the physical protection of the central server and its regional components has been ensured”.

“Any statements regarding the alleged successful unauthorised intrusions into the cyber space of the Central Election Commission or the elements of the elections systems do not correspond to the facts. Hackers are controlling nothing,” Markiyan Lubkivskyy, an adviser to the SBU chief, said.

An SBU spokeswoman told AFP that attacks on the election commission’s site began a week ago, “but so far we have dealt with them”.

– Outdoor video screens hacked? –

The cyber troubles came as Ukraine prepared for an election overshadowed by a bloody pro-Russian insurgency in the country’s east and the annexation by Russia of the Crimean province in the south.

Pro-Western and nationalist parties are expected to dominate the new parliament.

In another possible sign of cyber tensions, the Ukrainska Pravda news website on Friday reported that outdoor video screens across Kiev were briefly hacked.

The screens, which are used for advertising, including pre-election political ads, reportedly started to display “scary and horrible images,” the report said.

Engineers went out “to physically unplug” the screens, according to the report.

The report could not be confirmed, but footage on YouTube purporting to capture the incident showed a street screen abruptly switching to footage of destroyed buildings and dead bodies, as well as the images of two nationalist politicians running for parliament, with the words “war criminals”.

Source: http://www.ndtv.com/article/world/hackers-target-ukraine-s-election-website-611895

DDoS DDoS Attacks
11 arrested over cyberattacks on 70 government websites
October 22, 2014
0

Seventy official sites targeted by hackers ‘partly from other regions’ who declared ‘cyberwar’ after tear gas was used on Occupy protesters

Eleven people have been arrested over cyberattacks on more than 70 government websites this month after hackers warned of retaliation for the use of tear gas on democracy protesters.

The cyberattacks are believed to have been directed under the banner of Anonymous, a brand adopted by hackers and activists around the globe.

No information was changed or stolen, nor were the government’s online services affected significantly, Secretary for Commerce and Economic Development Greg So Kam-leung told lawmakers yesterday.

Attackers made the sites intermittently inaccessible through a flood of access requests, he said.

“Attacks launched by the hackers’ group originated partly from Hong Kong, and partly from other regions,” So said.

“Since any internet user can join Anonymous, [the attackers] could have originated from anywhere in the world and it is hard to find out their nationalities.”

Police had arrested eight men and three women, aged 13 to 39, on suspicion of accessing computers with criminal or dishonest intent, he said.

On October 2, web users identifying themselves as Anonymous hackers declared “cyberwar” on the government and police force after tear gas was fired at Occupy Central demonstrators late last month.

So told a Legislative Council meeting that more than 70 official sites were made temporarily inaccessible by so-called distributed denial-of-service (DDoS) attacks. During such attacks, website infrastructure is overwhelmed by a huge bombardment of traffic, overloading servers and slowing down the site’s functionality. So stressed that security was not compromised.

In contrast, hundreds of phone numbers and email addresses of the Ningbo Free Trade Zone and a job-search site run by the Changxing county administration, both in Zhejiang province, were exposed by Anonymous this month, apparently in support of the protesters. The data also included individual IP addresses and names.

So said hackers had hit some local websites as well, but did not have a significant impact on the city’s economic activities.

Lawmakers asked if the hacking was related to Occupy and the alleged involvement of “external forces” in the movement.

So said it could not be linked to any specific country as many computers originating from different places were involved. Police were investigating further.

The website of pro-democracy newspaper Apple Daily has also been the target of cyberattacks in recent weeks, coinciding with a blockade of its offices in Tseung Kwan O by pro-Beijing protesters.

No group has claimed responsibility for those cyberattacks, which followed similar attempts to make the Apple Daily website inaccessible in June when Occupy held an electoral reform “referendum”.

Source: http://www.scmp.com/news/hong-kong/article/1622171/more-70-hong-kong-government-websites-under-attack-anonymous-hackers