Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last April 7th. The data on the cyber attacks reported by Israel government are really different from the one provided by the group of hacktivists in the damage report for #OpIsrael that account for a Total damage of $3-plus billion damage.

The hackers hit the principal web sites of the country with a series of powerful DDoS attacks, but how the attackers did it?

The most plausible hypothesis is that Anonymous gathered control of a huge quantity of machine infected with a malware.

The researchers in TrendMicro use data collected by the Smart Protection Network, “a cloud-based security infrastructure that rapidly and accurately collects and identifies new threats, delivering instant protection for data wherever it resides.”

Analyzing traffic directed to one of the hit website the expert discovered that meanwhile usually more of 90% of the traffic is originated in Israel, during the attack on April 7th this percentage has fallen to 9%as shown in the following chart:

 

The attackers haven’t used compromised machines within Israel as usual happen, but the traffic coming from outside the Israeli networks appearing well distributed from 27 countries. The histogram below shows the spike in traffic during the attacks:

 

As usual I desire to reflect with you on the data:

According to TrendMicro many IP addresses involved in the attacks were related to machine belonging to known botnets under the control of cyber criminals. Which is the link between Anonymous and cybercrime?

Here you are my hypothesis:

  • Member of the collective is renting criminal services in the underground, in this way they could be operational in a short time and could avoid to be tracked back. Anonymous hasn’t its botnet and this is a strength because it can thus escape the investigations of security firms.
  • Criminal organizations joined in the attacks for other reasons, probably they were instructed to attack strategic objectives or to acquire sensitive information to resell.
  • Member of criminal organizations in many countries enjoys coverage governments for whom they conduct cyber operations,  this is nothing new, we all know about the dirty mixture of groups of hackers and central authorities.
  • As security community agrees that principal criminal organizations operate in Eastern Europe and in Russia, have you noted that none of these countries would seem to be involved in the attacks? I have your same idea.
  • I suppose that many governments were advantaged by the #OpIsrael to conduct attacks under cover  in what I consider an asymmetric and under silent Information warfare. The Anonymous attack could be used as a diversionary tactic that has alienated attention on the real targets of state sponsored hackers.

The investigation added another interesting element, the IP addresses used in the attacks had been previously identified as victims of other attacks like exploit kits, fake antivirus applications and ransomware.

TrendMicro post states:

“These attacks are not nearly as “harmless” as some would think.” “These findings highlight how major DDoS attacks are, at least in part, not just carried out by hacker groups like Anonymous but by cybercriminals as well. These attacks are not nearly as “harmless” as some would think.”

I agree, underestimate these attacks is stupid, these events must be analyzed in detail trying to identify the attackers and related motivations, but above all the real targets of the offensive …

Are we sure the websites hit was really the targets of the attacks? Is it possible that third part actors were silently attacking other infrastructures?

In my opinion Anonymous has received a great and unexpected support from other entities …

Does the collective really want this? I think no!

Pierluigi Paganini

(Security Affairs – Anonymous)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

6 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

18 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

21 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.