Hacks Of Swedish Military Used In 2013 Attacks On US Banks
Military spokesman Mikael Abramsson said that a server in the Swedish defence system had a flaw that was exploited by hackers to carry out the attacks, confirming a report in the Swedish daily DN.
“The hacking attack was a kind of wake-up call for us and forced us to take very specific security steps to prevent such a thing from happening again,” he said.
“We cannot be more specific about the new security measures we put in place, but such an attack could not happen again.”
The servers were used in a so-called DDoS (distributed denial of service) attack, which pounded the websites of US financial institutions such as Citigroup, Capital One and HSBC with overwhelming requests for information.
At the time, the attack, which began in 2012 and continued for months, was one of the biggest ever reported.
US officials blamed Iran, suggesting it was in retaliation for political sanctions and several earlier cyber attacks on its own systems.
Many other vulnerable servers in locations throughout the world were used in the attack, and together they created an Internet traffic jam so powerful that it knocked out the banks’ websites.
“We normally have a good eye on our stuff. This mistake is about the human factor,” Dan Eriksson, IT security expert with the Swedish armed forces, told DN.
DDoS attacks have long been a basic hacker weapon but they have typically involved the use of armies of personal computers tainted with viruses and coordinated to make simultaneous requests at targeted websites.
In 2013, attackers infected datacentres used to host services in the Internet “cloud” and commandeered massive computing power around the world to back the DDoS attacks, security experts said.
US-based Neustar, which protects companies from such attacks, said they can cost financial institutions as much as $100,000 an hour … sometimes for several days