DoS Cyber Attack Campaign Against Israeli Targets April 7-9th, 2013


May 15, 2013 02:00 PM

Background

On April 7th, a Radware customer was targeted with DoS attacks assembled by the Anonymous group as part of an attack campaign on the Israeli cyberspace.

The focus of this report is to analyze the attack on the customer’s networks and clients, while examining the magnitude of the attack. The report contains the attack vectors and tools that were used against the customer’s network based on ERT’s analysis.

When analyzing the reports generated by DefensePro units installed on customer premises, ERT took a top-down approach, focusing on the most prominent attacks observed by bandwidth and number of incidents.

Known Attack Tools

Attacks were dissected by the number of independent attack triggers reported by DefensePro per known attack tool. From the graph below, we can see the most used attack tools. At the time of the attack, LOIC (both TCP and UDP attack vectors), and Slowloris were used.

Additional Information

For additional information regarding the threat, read the full Attack Report.

Download Now

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia