In an effort to fight for the rights of digital consumers throughout South America, the hacktivist group Anonymous has launched OpOperadoras, coordinated cyber assault against Brazilian telecommunication companies in response to a fixed broadband provision that would ban unlimited data plans in Brazil.
Download a Copy Now
In an effort to fight for the rights of digital consumers throughout South America, the hacktivist group Anonymous has launched OpOperadoras,i coordinated cyber assault against Brazilian telecommunication companies in response to a fixed broadband provision that would ban unlimited data plans in Brazil. ii
The provision has enraged millions of Internet usersiii throughout South America.
The first organization struck was ANATEL – The National Telecommunications Agency. ANATEL suffered a large-scale DDoS attack that reached 40Gbpsiv of traffic generated via international bots, in parallel to SQL injections that resulted
in extraction of confidential informationv regarding executives at various telecommunication companies.vi
Hackers have posted a sample of the database on Ghostbin and are threating to release more data.
This attack was unique as perpetrators executed it using the smoke screen technique. To create confusion and misdirection, attackers overwhelm the security personnel with irrelevant traffic, slowing down unrelated applications or filling logs with irrelevant data. While the security team is kept busy, the primary attack is launched.
This time – various DDoS bursts of 4-40Gbps as well as SQL injections to infiltrate servers and extract sensitive data.
Figure 1: Attackers respond to ANATEL's president comment "internet users spending too much time playing games"
The attackers published a DDoS tutorial for participantsvii, explaining how to achieve a Denial-of-Service state using low and slow attacks (hack tools include: LOIC, Web Loic, SlowLoris and PyLoris).
Tutorials Suggested via Op
How to Identify a Smoke-Screen Attack?
If an anomaly is identified, review the following questions:
- What is the intent?
- Is it designed to disrupt the network?
- Is the infrastructure/data center designed to handle it?
- Is it a decoy?
Then take the following steps:
- Check logs and perhaps filter out vectors once they've been ruled them out.
- Check additional assets and collaborate with other departments throughout the organization to ensure that nothing else appears wrong.
- Tune the Web Application Firewall (WAF), as it can help prevent data theft and manipulation of sensitive corporate data in addition to safeguarding customer information.
- Combining WAF with an on-premise detection and behavioral analysis solution lets you mitigate smokescreen attacks while protecting customer data.
It is absolutely critical that organizations adopt layered security models to protect their websites and databases. DDoS mitigation appliances can protect you from the smoke screens. Firewalls and a strong perimeter can secure access. Make use of the tools and forensic data that you have available. Remember: things aren't always what they seem and a smoke screen attack just might be real intent of obvious network events.
Figure 2: ANATEL's acknowledges the abnormal behavior followed by a DDoS attack
Effective DDoS Protection Elements:
- A hybrid solution that combines on-premise detection and mitigation with cloud-based protection for volumetric attacks. It provides quick detection, immediate mitigation and prevents internet pipe saturation.
- Solution must distinguish between legitimate and malicious traffic, protect the SLA and block the attack.
- An integrated, synchronized solution that can protect from multi-vector attacks combining DDoS with web-based exploits such as website scraping, Brute Force and HTTP floods.
- A cyber-security emergency response plan that includes an emergency response team and process in place. Identify areas where help is needed from a third party.
Effective Web Application Protection Elements
(against web intrusions, defacement and data leakage):
- IP-agnostic device fingerprinting – Having the ability to detect attacks beyond source-IP using by developing a device fingerprint that enables precise activity tracking over time.
- Automatic and real time generation of policies to protect from zero-day, unknown attacks.
- Shortest time from deployment to a full coverage of OWASP Top-10.
Radware's hybrid attack mitigation solution provides a set of patented and integrated technologies designed to detect, mitigate and report the most advanced threats. Dedicated hardware and cloud solutions protect against attacks in real time and help ensure service availability.
Under Attack and in Need of Expert Emergency Assistance?
Radware offers a full range of solutions to help networks properly mitigate attacks similar to these. Our attack mitigation solutions provide a set of patented and integrated technologies designed to detect, mitigate and report todays most advanced DDoS attacks and cyber threats. With dedicated hardware, fully managed services and cloud solutions that protect against attacks, Radware can help ensure service availability. To understand how Radware's attack mitigation solutions can better protect your network contact us today.
- i https://twitter.com/anonopsbrazil
- ii https://www.facebook.com/Anonopsbrazil/photos/a.355615344512198.79166.244582758948791/1069977439742648/
- iii http://www.zdnet.com/article/brazilians-protest-against-fixed-broadband-data-cap/
- iv https://eng.registro.br/pipermail/caiu/2016-April/049653.html
- v https://ghostbin.com/paste/32jjr/raw
- vi http://pastebin.com/RhvyFmvv
- vii http://pastebin.com/dkEMzJsr