DDoS attack against small bank
What do you mean the websites down, Oh Noes...
The number of companies that have been hit by DDoS attacks is simply astounding. Now cyber criminals are using a new technique to take advantage of this old way of doing business. The "Bank of the West" and contracting firm "Ascent Builders" found out the hard way that DDoS attacks are now being used to cover up actual financial fraud and theft. The way it works is simple:
1) Hack an account through either social engineering or a software exploit
2) Access that account and give a fund transfer authorization
3) Initiate a DDoS attack against the institution, thus making the website unusable for the victim and the bank
4) Transfer the funds from the original account to another, then another, then another to prevent tracking
5) ???
6) Profit
Well, obviously that ??? isn't necessary but who doesn't like a good joke. Unfortunately for Ascent Builders, this is not really a funny joke. From the article DDoS Attack on Bank Hid $900,000 Cyberheist:
But a law enforcement source working the case and speaking on condition of anonymity confirmed that the bank was subjected to a DDoS attack at the time of the robbery. The law enforcement official added that Ascent may not have been the only victim that day at Bank of the West, and that several other businesses and banks in the local area had been similarly robbed on or around Christmas Eve.
Unfortunately for these victims, the DDoS attack makes it incredibly hard for the FBI to sort out the traffic on the banks website and identify the perpetrators. Sadly, these DDoS attacks can be mitigated and you'd think that a financial institution would try to secure its website. From DDoS attack methods and how to prevent or mitigate them
In addition from: http://www.cisco.com/en/US/tech/tk59/technologies_white_paper09186a0080174a5b.shtml
Behind a [corrupt] Client is a person that orchestrate an attack. A Handler is a compromised host with a special program running on it. Each handler is capable of controlling multiple agents. An Agent is a compromised host that runs a special program. Each agent is responsible for generating a stream of packets that is directed toward the intended victim.
Attackers have been known to use these four programs to launch DDoS attacks:
Trinoo
TFN
TFN2K
Stacheldraht
In order to facilitate DDoS, the attackers need to have several hundred to several thousand compromised hosts. The hosts are usually Linux and SUN computers; but, the tools can be ported to other platforms as well.
It goes on to say that you can there are ways to tell if a computer is infected with these viruses, and deny traffic based on that. These attacks can also be mitigated in other ways, such as:
1) Limiting the number of failed queries allowed by an ISP
2) Getting multiple DNS servers to help handle the increased capacity.
3) Caching Servers also can help mitigate this by allowing your servers to not need to "exchange" even more information for every request.
4) Having traffic management be setup
Google, as always is a great resource, and googling DDoS or how to prevent a DDoS can get you valuable information. In addition, security websites like dark reading, or local security professionals can help get you up to speed. These are just a few ways to educate yourself, and obviously for people or businesses really serious about security, you should be contacting someone who is a professional to help you mitigate these attacks immediately.