On April 7th, a Radware customer was targeted with DoS attacks assembled by the Anonymous group as part of an attack campaign on the Israeli cyberspace.
The focus of this report is to analyze the attack on the customer’s networks and clients, while examining the magnitude of the attack. The report contains the attack vectors and tools that were used against the customer’s network based on ERT’s analysis.
When analyzing the reports generated by DefensePro units installed on customer premises, ERT took a top-down approach, focusing on the most prominent attacks observed by bandwidth and number of incidents.
Known Attack Tools
Attacks were dissected by the number of independent attack triggers reported by DefensePro per known attack tool. From the graph below, we can see the most used attack tools. At the time of the attack, LOIC (both TCP and UDP attack vectors), and Slowloris were used.