The powerful attack has knocked the FTC’s Web site offline and caused many outages in South Korea…

Online attack hits US government Web sites

A botnet composed of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea.

The attack started Saturday, and security experts have credited it with knocking the Web site of the U.S. Federal Trade Commission (FTC) offline for parts of Monday and Tuesday. Several other government Web sites have also been targeted, including the U.S. Department of Transportation (DOT).

“The DOT has been experiencing network incidents since this past weekend. We are working with the U.S. Computer Emergency Readiness Team (US-CERT) at this time,” a DOT spokeswoman said Tuesday.

A spokeswoman for the U.S. Department of the Treasury confirmed that the Treasury’s Web site had been hit with a denial-of-service attack.

“We’re working with our service provider to mitigate the impact,” she said.

A spokeswoman for the FTC could not say what caused the outage at that agency’s Web site.

Other targets have included banking Web sites in Korea, U.S. Bancorp, the U.S. Secret Service, the U.S. Department of Homeland Security, the U.S. Department of State, the White House, the U.S. Department of Defense, the New York Stock Exchange, Nasdaq and the Washington Post, according to security researchers studying the incident.

A more complete list of U.S. and South Korean sites targeted in the attack has been published by a Korean blogger who posted an analysis of the botnet code. According to this list, Amazon and Yahoo have also been targeted.

The U.S. Department of Homeland Security (DHS), which runs US-CERT, said late Tuesday that it had warned federal agencies and partner organizations and was working to mitigate the attack. “We see attacks on federal networks every day, and measures in place have minimized the impact to federal Web sites,” the DHS said in a statement. “US-CERT will continue to work with its federal partners and the private sector to address this activity.”

The attack, while powerful, is not particularly sophisticated and appears to be more of a nuisance than a threat to security. It uses a variety of well-known distributed denial of service (DDoS) attacks that try to overwhelm Web sites with useless requests and make them unavailable for legitimate users, security experts say. Most of the targeted sites in the U.S. appeared to be working normally on Tuesday.

However, the attack had a much greater impact in South Korea, where it was a top news story after several prominent sites remained offline Wednesday, local time. South Korean sites were first hit on Tuesday, several days after the U.S. portion of the attack kicked off.

The Web site for South Korea’s president, the Blue House, and those for the National Assembly and Ministry of National Defense were all offline at Wednesday lunchtime. Also inaccessible was the home page of the Grand National Party and the Chosun Ilbo national newspaper.

The Korea Internet Security Center’s security threat index was set at “substantial,” which is the middle of its five levels and signifies regional Internet security problems. It advises all Internet users to take urgent security measures.

The attack also hit the electronic banking sites of Korea Exchange Bank, Shinhan Bank and NongHyup Bank, and took down the Web site of the U.S. Forces Korea.

Such DDoS attacks are relatively common, but a few things make this week’s incident unusual. The botnet code behind the attack does not use typical antivirus evasion techniques and does not appear to have been written by a professional malware writer, according to Joe Stewart, a researcher with SecureWorks who has looked at the code.

On Saturday and Sunday the attack was consuming 20 to 40GB per second of bandwidth, about 10 times the rate of a typical DDoS attack, one security expert said after being briefed by the US-CERT on Tuesday. “It’s the biggest I’ve seen,” said the expert, who asked not to be identified because he was not authorized to discuss the matter. By Tuesday it was averaging about 1.2GB per second, he said.

Security experts estimate the size of the botnet at somewhere between 30,000 and 60,000 computers.

It is also unusual to see relatively low-profile government Web sites being hit. “Who goes around targeting a site like the FAA or the U.S. Treasury? It’s not something that most people would think to attack,” Stewart said.

The FTC in the past has brought actions against spammers and Internet fraudsters. Last month it shut down an Internet service provider called Pricewert, which had been associated with botnets, spam and child pornography.

No one knows who is behind the attack, although Stewart said it could have been launched by a single person. “It just seems to me that somebody is mad for some reason at capitalist governments,” he said. Security experts say most of the infected machines are located in South Korea, but that doesn’t mean the attack originated there.

The fact that the DDoS attack took down government computers is an embarrassment to the U.S., which is working to strengthen the country’s cybersecurity defenses under President Barack Obama.

“These are very basic attacks and stuff we’ve seen for a very long time. The scale of these isn’t very huge either,” said one security expert, who spoke on condition of anonymity because he wasn’t authorized to discuss the matter publicly. “It’s embarrassing that these sites have been hit for four or five days and they’re still being affected. Think of the money that eBay and Amazon would lose in four to five days of this.”

(By: By Robert McMillan and Martyn Williams. Grant Gross in Washington and Nancy Gohring in Seattle also  contributed to this story.)

Related Download
Cisco Secure Mobility Knowledge Hub Sponsor: Cisco
Cisco Secure Mobility Knowledge Hub
This Knowledge Hub provides an end-to-end look at what it takes to discover, plan, and implement a successful Secure Mobility strategy.
Learn More
Share on LinkedIn Share with Google+ Comment on this article