BBC NEWS Americas Africa Europe Middle East South Asia Asia Pacific Arabic Spanish Russian Chinese Welsh
BBCi CATEGORIES   TV   RADIO   COMMUNICATE   WHERE I LIVE   INDEX    SEARCH 

BBC NEWS
 You are in: Sci/Tech
Front Page 
World 
UK 
UK Politics 
Business 
Sci/Tech 
Health 
Education 
Entertainment 
Talking Point 
In Depth 
AudioVideo 


Commonwealth Games 2002

BBC Sport

BBC Weather

SERVICES 
Tuesday, 30 October, 2001, 12:55 GMT
Attacks from the heart of the net
The White House, AP
White House website was hit by a denial of service attack
As the security improves on one part of the internet, malicious hackers are changing their tactics to take advantage of lapses elsewhere.

A report by the Computer Emergency Response Team (Cert) in the US has revealed that some computer vandals are now targeting the machines making up the fabric of the net.

Some attackers are starting to use routers - devices that pass data packets around the net - to bombard sites and servers with enormous amounts of data.

The report also warns that the pace of attacks is growing, and that security experts have a ever-shrinking opportunity to close holes or develop patches.

Smurfing activity

The report traces the development of the methods malicious hackers and vandals are using to carry out Denial of Service (DoS) attacks on websites and servers.


One of the most recent and disturbing trends we have seen is an increase in intruder compromise and use of routers

Computer Emergency Response Team
The first DoS attacks took place in February 2000 when popular sites such as Yahoo, Amazon, eBay and CNN were knocked offline by being bombarded with bogus data packets.

At the time, anyone wanting to carry out these attacks had to use largely manual methods to find and compromise machines that could launch data packets on their behalf.

The response to these high-profile attacks meant that the tactic used to generate the net traffic, known as smurfing, became much more difficult to carry out.

But as one loophole closed, attackers moved on to develop new methods and strategies. Now tools are available that can automatically scan for vulnerable machines and infect them.

Once infected, machines can be made to report their readiness to net chat services. Many attackers co-ordinate the machines under their control via the same chat channels.

Closing window

One new strategy is causing particular alarm. "One of the most recent and disturbing trends we have seen is an increase in intruder compromise and use of routers," said the report.

Routers are hardware devices that pass data packets around the net. They are attractive to attackers for very simple reasons.

"Routers are often less protected by security policy and monitoring technology than computer systems, enabling intruders to operate with less chance of being discovered," warn the authors.

The routers are being used to scan for vulnerable machines, to hide links to chat channels used to control compromised machines, as well as to launch streams of data packets.

The report paints a grim picture of the future and said DoS attacks were likely to prove "attractive and effective" in the future.

To make matters worse, security experts who protect sites from attack are getting less and less time to learn about new threats and ways to counter them.

The report said: "The window of opportunity between vulnerability discovery and widespread exploitation, when security fixes or workarounds can be applied to protect systems, is narrowing."

See also:

09 Feb 00 | Sci/Tech
Yahoo attack exposes web weakness
29 Aug 01 | Sci/Tech
Doing science by stealth
05 May 01 | Americas
White House website attacked
11 Feb 00 | Business
US combats cyber attacks
17 Oct 01 | Sci/Tech
US plan for secure internet 'flawed'
24 May 01 | Sci/Tech
Web warning centre in net attack
02 Aug 01 | Sci/Tech
Code Red 'was never a threat'
Internet links:


The BBC is not responsible for the content of external internet sites

Links to more Sci/Tech stories are at the foot of the page.


E-mail this story to a friend

Links to more Sci/Tech stories