Jump to content

Computer Hackers Attack Root Servers Of Internet


george

Recommended Posts

Computer Hackers Attack Root Servers of Internet

Hackers last night mounted the most significant attack since 2002 on the computers that direct traffic on the internet, it emerged today.

The hackers, believed to be from Asia, bombarded the 13 computers, or root servers, that serve as the internet's central address books.

But although the assault lasting several hours was the largest in the past five years, it had little effect on internet users.

"It was a significant and concerted attack, but the average internet user would have barely noticed," said Paul Levins, the vice-president of corporate affairs at the Internet Corporation for Assigned Names and Numbers (Icann), the body that oversees the running of the root servers and the net's addressing system.

"Ironically, the system gets stronger and better because of the attacks as we're constantly upgrading the technology," Mr Levins said.

Hackers periodically try to overwhelm the root servers with requests and information, which can slow down the network response.

The servers are distributed throughout the world and, much like an electricity grid system, can redirect their efforts to where demand is highest.

Root servers manage the internet's domain name system (DNS), used to translate web addresses such as guardian.co.uk into the numerical internet protocol (IP) addresses used by machines.

When a person types the name of a website into a web browser it looks up the location of that site by consulting a root server.

Two servers seemed to be the target of yesterday's attack, one operated by the US defence department and the other by Icann.

The US homeland security department confirmed it was monitoring what it called "anomalous" internet traffic.

"There is no credible intelligence to suggest an imminent threat to the homeland or our computing systems at this time," the department said in a statement.

The attacks began last night and lasted as long as 12 hours.

"The main thing is that there was very little impact on the general public, the servers were able to hold up against the attacks. The internet in general was designed to even withstand a nuclear attack," Zully Ramzan, a researcher at Symantec Security Response, told CNET News.com.

-- Guardian 2007-02-08

Link to comment
Share on other sites


Hackers Launch Massive Attack on Internet DNS

Hackers on Tuesday launched a denial-of-service (DoS) attack against at least three of the 13 root servers that maintain the Internet's Free How-To Guide for Small Business Web Strategies - from domain name selection to site promotion. domain name system Back up your business with HP's ProLiant ML150 Server - just $1,299. (DNS).

The attacks, which lasted for 12 hours, reportedly targeted the server that maintains the dot-org suffix, and the servers at the Department of Defense and the Internet Corporation for Assigned Names and Numbers Latest News about Internet Corporation for Assigned Names and Numbers.

The attacks were largely unsuccessful -- and reportedly less serious than a similar attack in 2002 -- as most Internet users hardly noticed any impact. The DNS' resilience is largely due to robust protection and a high degree of redundancy built into it, including algorithms designed to balance unusually high levels of traffic.

"This is a high-profile target, so there are a lot of measures in place to protect it," Zulfikar Ramzan, senior principal reseacher with Symantec (Nasdaq: SYMC) Latest News about Symantec Security Response, told TechNewsWorld. "If the attack had been successful, it would have been a different story."

The shoring up groups did following the previous attacks "clearly worked," Matt Sergeant, senior antispam technologist at MessageLabs Latest News about MessageLabs, told TechNewsWorld. "They have been readjusted and redistributed so an attack will be more widespread than just concentrated on a specific server."

Rumor Mill

Little concrete information has been released about the attacks. Presumably, the involved organizations are still analyzing the data Free Trial - Way Beyond CRM – Learn how Landslide can help you..

"No one is talking about it," Dave Kennedy, senior risk analyst for Cybertrust, told TechNewsWorld. "No one is asking for help."

In this environment, speculation, rumors and misinformation have been rampant. For instance, it has been reported that the bulk of the attacks emanated from South Korea.

"We don't understand why South Korea is being blamed because from what we are seeing it is not them," Kennedy stated. "I have seen other reports that said [attacks from] China [are] playing a bigger role."

Reports also vary about the severity of the attacks. "There have been some exaggerations from what I can tell," he noted. "The servers were never down. They may have been unreachable in some places but that was more a result of the servers protecting themselves during the attack."

More than likely, the hackers used a bot network, or zombie computers, to carry out the attacks, Ramzan said. "Individual computer users should make sure they are not an accessory to such acts" by maintaining proper security Barracuda Spam Filter – Free Evaluation Unit.

Unfortunately, Sergeant commented, bot networks are easily available. "The hackers could have created their own or bought a network for a few hundred dollars."

Speculation About Intent

There is also no shortage of speculation on the intent of the attacks, and the fact that the attacks occurred on Safer Internet Day did not escape notice.

Kennedy pointed out that the attacks coincided with the North American Network Operators' Group annual meeting, held this year in Toronto. Another DoS attack in 2000 also occurred during the group's meeting, he said.

It's also possible the attacks were committed for a hacker Latest News about hacker or a group of hackers to show someone in their circle what they can do, Kennedy stated.

However, if that were the case, it's unlikely that there would be repeat demonstrations, at least on a regular basis, he said.

Hackers and malware writers need the Internet to do business themselves -- not only to communicate but also to run online scams, Kennedy contended.

"There is little point for them to bring it down. ... Generally, though, it is hard to get into the heads of hackers and try to figure out what motivates them," he said.

Sophisticated Rerouting

The most obvious motivation is financial gain -- the main driver behind most malware on the Internet today. Assuming everything had gone the hackers' way, in fact, they could have made more money than any malware writer had made before.

If the hackers had gained control of the servers, they could have begun rerouting traffic and performing sophisticated farming attacks, Randy Abrams, director of technical education at antivirus software firm Eset, told TechNewsWorld.

A user would type in an address and get rerouted to a different address without realizing it in this scenario. Online banking, as an example, would probably be a key target.

--Agencies 2007-02-08

Link to comment
Share on other sites

"The main thing is that there was very little impact on the general public, the servers were able to hold up against the attacks. The internet in general was designed to even withstand a nuclear attack," Zully Ramzan, a researcher at Symantec Security Response, told CNET News.com.

:o

That's the difference between theory and practice. The internet was designed to be decentralized so there's no single point of failure. In practice, however, strategically taking out just a few links would bring the whole thing to its knees.

For example, you can take most of asia offline by damaging a few underseas cables. You don't even have to go underseas 'cause these cables beach _somewhere_. Not too long ago there was a single beachhead for the cables between the U.S. and Europe, even simpler there. Not sure that's by design so the NSA can listen to all communications between EU and US or if it just happened... a nuke on that thing would definitely take out most of the internet. But you wouldn't even need a nuke, some cable cutters and diving equipment would probably do :D

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.








×
×
  • Create New...
""