An event with the magnitude of the Summer Olympics is a likely target for many attack threats, including IT security attacks. Radware security researchers have found that the Olympic Games website is on the radar of hackers who published an HOIC booster script on
pastebin. The time or size of these potential attacks is unknown. Additionally, we’ve identified two companies’ URLs that were found on HOIC booster scripts in the last 24 hours. Presumably, this means that two companies could be targeted for future attacks; others may be targeted as well.
High Orbit Ion Cannon (HOIC) is an HTTP Flood attack tool, created by Anonymous, available as an easy-to-run Windows executable generated DDoS attack. Its uniqueness lies in the fact that it offers customized booster scripts targeting victims’ website pages and subpages, therefore increasing the attacks’ intensity and lowering the odds that attacks will be stopped.
HOIC is a relatively new tool which Group Anonymous leverages as a ‘weapon system’ of sorts. This tool allows Anonymous to change the ‘ordinance’ of the attack via a concept called “Boosters.” These Boosters are software scripts which can be uploaded into the HOIC tool to vary the attack type and effectiveness.
Make sure your DoS and DDoS protection equipment is properly configured to block the HOIC attack tool and to protect your critical online services from a multi-vector attack on your network and applications.
Radware’s customers are encouraged to contact our support team and receive immediate assistance from our ERT team. Other prospects and non-Radware customers can contact our ERT through a