Home / Software & Gaming / Security / Imperva Analyzes High-Profile ‘Anonymous’ Attack

Imperva Analyzes High-Profile ‘Anonymous’ Attack

– Imperva, Inc  a pioneer and leader of a new category of data security solutions for high-value business data in the data center, released today a report that reveals details on an attack by hacktivist group ‘Anonymous’ against a high-profile unnamed target during a 25-day period in 2011.

The Hacker Intelligence Summary Report –The Anatomy of an Anonymous Attack offers a comprehensive analysis of the attack, including a detailed timeline of activities from start to finish, an examination of the hacking methods utilized and insights on the use of social media to recruit participants and coordinate the attack.

“Our research shows that Anonymous generally mimics the approach used by for-profit hackers, leveraging widely known methods – SQL injection and DDoS – to carry out their attack. We found that Anonymous, although it has developed some custom attack tools, generally uses inexpensive, off-the-shelf tools as opposed to developing complex attacks,” said Amichai Shulman, Co-Founder and CTO of Imperva.  “Our research further shows that Anonymous will try to steal data first and, if that fails, attempt a DDoS attack.”Highlights from the study of the Anonymous attack include:

  • The attack was made up of three distinct phases: recruitment and communication, reconnaissance and application layer attacks and, finally, a distributed denial of service (DDoS) attack.
  • Social media channels, especially Twitter, Facebook and YouTube, were the predominant means for suggesting a target and justifying the attack, as well as recruiting volunteers to participate in the hacking campaign, during the first recruitment and communication phase.
  • Sophisticated hackers made up only a small portion of the volunteers and were primarily active during the reconnaissance and application attack phase, tasked with probing for vulnerabilities and waging application attacks like SQL injection to attempt to steal data from the targets.
  • Laypeople were leveraged only in the third phase – to help carry out a DDoS attack – since the attempt to steal data through application attacks failed.
  • Anonymous has developed some custom attack tools – specifically the low orbit ion cannon (LOIC) and a tool to enable the launch of a DDoS attack from mobile browsers.  However, the group also relies on widely available tools for finding and exploiting web application vulnerabilities during the reconnaissance and application attack phase.
  • Unlike for profit hackers, Anonymous rarely relies on common hacking techniques such as botnets, malware, phishing or spear phishing.

“Imperva’s Application Defense Center (ADC) was able to witness and report on an Anonymous attack from start to finish,” continued Shulman. “The analysis of this attack provides useful insight into how Anonymous recruits participants and wages an attack. We believe these details will help organizations prepare for and respond to a potential attack, as well as offer the greater security community a deeper understanding of how hacktivists operate.”

Online Resources

  • Download a copy of the Anatomy of an Anonymous Attack.
  • Download an illustrative infographic outlining the attack.
  • Register to watch a webinar detailing the Anonymous attack.
  • Visit the Imperva blog for more insight on the report.

Source: Press Release

Become a Patron!

Check Also

Sony investigating claims of major security breach

This week, a ransomware group claimed to have breached "all of Sony's systems", putting the stolen data up for sale on the dark web. Sony has yet to confirm that an attack has taken place but the company is now investigating.