AWRM
Previous Thread
Next Thread
Print Thread
Did the U.S. Launch a Cyberattack on Drudge? #159981
12/30/2016 09:30 AM
12/30/2016 09:30 AM
Joined: Jan 2002
Posts: 23,941
Tulsa
airforce Online content OP
Administrator
airforce  Online Content OP
Administrator
Senior Member
Joined: Jan 2002
Posts: 23,941
Tulsa
Matt Drudge thinks so.

Quote
A tweet from conservative media icon Matt Drudge's verified Twitter account Thursday night appeared to accuse the government of interfering with his website, DrudgeReport.com, just hours after the Barack Obama administration announced new sanctions against Russia over election after the Barack Obama administration announced new sanctions against Russia over election hacking.

"Is the US government attacking DRUDGE REPORT? Biggest DDoS since site's inception. VERY suspicious routing [and timing]," the tweet to Drudge's 457,000 followers read. There were no other tweets from the account at the time.


A large-scale distributed denial of service attack, or DDoS, can cause major Internet disruptions. In the past, such attacks have shut down major websites such as Twitter, Spotify, Netflix, Amazon, Tumblr, and Reddit. The attack sends a server many illegitimate requests to make it hard for real requests to get through, effectively shutting down the site.

Drudge Report was down briefly around 7 p.m. EST, but working hours later. The top headline read: "MOSCOW MOCKS OBAMA 'LAME DUCK'" Meanwhile, the conservative Washington Times wrote: "Matt Drudge suggests U.S. government cyberattack on Drudge Report website. DDoS attack comes same day Obama announced countermeasures against Russia for hacking of Democrats."

Conservatives on Twitter also accused the government of shutting down the Russian news website, RT. "Numerous reports of Russian state-run Network RT being unavailable. Drudge Report also under 'Biggest DDoS attack since site's inception,'" wrote one user.

President Barack Obama announced Thursday sanctions against several Russian agencies and individuals after cyberattacks during the 2016 presidential election against Democratic Party institutions that appeared to help Donald Trump win over Hillary Clinton.

"All Americans should be alarmed by Russia's actions. In October, my administration publicized our assessment that Russia took actions intended to interfere with the U.S. election process," Obama said. "These data theft and disclosure activities could only have been directed by the highest levels of the Russian government. Moreover, our diplomats have experienced an unacceptable level of harassment in Moscow by Russian security services and police over the last year. Such activities have consequences."

Government officials have wrangled with Drudge before over his alleged false claims. With 2 million daily unique visitors and around 700 million monthly page views, DrudgeReport.com was the top site for referral traffic in 2014 to the Daily Mail, CNN, Fox News, Roll Call, Breitbart, The New York Times, USA Today, Associated Press and other news sites. Its readers were loyal, staying on the site for an average of 30 minutes, Politico reported.

"People are religious in how they come to Drudge," Vipul Mistry, Intermarket's Business Development manager, told Politico's On Media blog. "When we analyzed all our audience that's what it is, people are on there not only in morning, they tend to leave it open as it refreshes."
Onward and upward,
airforce

Re: Did the U.S. Launch a Cyberattack on Drudge? #159982
12/31/2016 03:49 AM
12/31/2016 03:49 AM
Joined: Oct 2001
Posts: 19,745
A 059 Btn 16 FF MSC
ConSigCor Offline
Senior Member
ConSigCor  Offline
Senior Member
Joined: Oct 2001
Posts: 19,745
A 059 Btn 16 FF MSC
I bet the Russians did it. laugh


"The time for war has not yet come, but it will come and that soon, and when it does come, my advice is to draw the sword and throw away the scabbard." Gen. T.J. Jackson, March 1861
Re: Did the U.S. Launch a Cyberattack on Drudge? #159983
01/07/2017 04:48 AM
01/07/2017 04:48 AM
Joined: Oct 2001
Posts: 19,745
A 059 Btn 16 FF MSC
ConSigCor Offline
Senior Member
ConSigCor  Offline
Senior Member
Joined: Oct 2001
Posts: 19,745
A 059 Btn 16 FF MSC
Hack Attack on Drudge Report a Sign of Chaos to Come

By Brady Dale • 01/03/17


The popular right-leaning web portal, The Drudge Report, was briefly knocked offline last week. Incidents like this will only become more common until policymakers or tech companies get serious about fixing connected gadgets, also known as the internet of things (IoT).

In a since deleted post, the site’s verified @DRUDGE account on Twitter posted last week, “Is the US government attacking DRUDGE REPORT? Biggest DDoS since site’s inception. VERY suspicious routing [and timing],” as the International Business Times reported.

The Drudge Report did not respond to a request Friday for more details about the suspicious timing and routing.

Traffic from the Drudge Report is gigantic. Similar Web estimated it saw 178 million visits in November and that almost 80 percent of that traffic was direct. In other words, rather than clicking over from Facebook or finding it in search, visitors typed the URL directly into their browser or they have it set as the page their browser opens upon launch.

The importance of Drudge to other publishers cannot be overstated. In addition to its ability to point a firehose of traffic toward other sites, the careful curation of its founder, Matt Drudge, acts as something of a seal of approval for sites seeking the approbation of one of the very few people in American media capable of single-handedly driving the national conversation.

For those who haven’t visited, the site is overwhelmingly devoted to links to other sites. Web analytics platform Parse.ly currently estimates that 0.7 percent of all referral traffic to sites it monitors come from Drudge. That’s three times more than Reddit, just 0.1 percent behind Google News.

What is a DDoS attack?

The term has been thrown around so much lately that people may be reading it without knowing what it is. Often referred to as a “hack,” that’s somewhat debatable. Some might argue that a DDoS attack is no more a hack than kicking a door down is picking a lock.

DDoS refers to “distributed denial of service.” It overwhelms a site (or network node) with traffic from multiple sources. So much traffic that the site becomes unavailable to legitimate visitors, but a DDoS attack does nothing to the site itself (besides potentially running through its hosting budget). Once a DDoS attack is over, the site is there, same as ever, undamaged.

Bruce Schneier described a DDoS attack in real world terms this way: imagine a bunch of people called every delivery service in town at once and asked them all to deliver something to your house. Your house is fine, but no one can get to it because the roads around it are clogged.

In that sense, DDoS attacks don’t really “hack” the target site. There’s a lot of ways to construct a DDoS system, though, and that’s where the cleverness comes into play.

These days, DDoS systems do rely on hacking their weapons, which are compromised devices connected to the internet (such as routers, printers, TVs and etc). Ironically, security cameras are probably the most dangerous. Consumers buy smart home gadgets, never change the factory username and password and that leaves them vulnerable to remote access by criminal software.

The software finds these devices, puts some code on them and then directs them to send requests to specific IP addresses when an attack is on. The user of the device probably won’t notice. A request from any one device wouldn’t be enough to impact a site, either, but when it gets multiplied into the hundreds of thousands it can be enough to shut a site down.

This method is called a “botnet.” Your baby monitor or smart refrigerator could be contributing to botnet attacks and you would have no idea.

We previously reported on three strategies for beating botnets.

Who hit the Drudge Report?

This is basically an impossible question to answer, such is the aggravating nature of a distributed attack. Hackers make attributing the attacker more difficult by open sourcing their software. The Mirai botnet, for example, which took the internet infrastructure service Dyn offline in October, is open source. Setting up a botnet is not trivial, but the code’s availability means there is more than a few adversaries out there who can use the software.

The attack on the site appears to have been short based on the reporting. IB Times wrote that it started around 7 PM. The Washington Times checked at 8:30 PM and it was back up, so it couldn’t have been longer than 90 minutes.

“There are DDoS for hire sites that will launch hundreds of gigabits of attack traffic at a site and charge on a per-minute basis,” Matthew Prince, the CEO of Cloudflare, a company that helps sites mitigate against DDoS attacks, wrote in an email. “The cost of these services is relatively low, likely well less than $1,000 for a 90-minute attack.” The Drudge Report is not a Cloudflare customer.

If we did know more about the nature of the attack, the sophistication of the adversary could indicate something about its identity.

“The number of actors who can perpetrate the most advanced attacks are still fairly limited,” Andy Yen, co-founder of Protonmail, told the Observer in an email. “Generally, the sophistication of the attack is a good indicator, for example, what are the attack vectors, how many networking points are being hit simultaneously, and how quickly the attackers are able to counteract defensive measures.”

Protonmail provides encrypted email services. It’s unspyable communication system has put a target on its back. In 2015, it got hit by a two-for-one DDoS attack, as the Observer reported. Yen explained that the company knew the larger of the two hits was bad when it became clear that its attackers were hitting multiple European nodes in order to make it more difficult for the service to route traffic around it. That kind of sophistication indicated that it was attributable to something more sophisticated than a cyber gang, perhaps even a nation-state.

Will DDoS attacks get worse?

It looks that way, but not everyone agrees.

Verisign just released a report that said that the number of attacks have been going down, even as their size had increased. Verisign customers saw vastly larger attacks this year over last, but the attacks have also shrunk as the year went on. The report only goes through the third quarter of last year, falling just short of the time period that included the epic attacks on Krebs and Dyn; however, Verisign did observe a record setting attack on one of its customers during that time period.

There’s little market incentive to fix the problem, as Schneier explained on his blog. A consumer buys a connected nanny cam. He checks it on his phone every now and then. It seems to work. He’s happy. Its manufacturer has already been paid. It’s happy. Meanwhile, it’s sending out one of millions of pings to some site under attack. The victim of the attack was not involved in this transaction at all.

More cybercriminals get into the DDoS as a Service business every day, while governments and hardware makers dawdle. The Merkle reports that the line of business is only becoming more profitable. In fact, veterans are making money not by running attacks but by getting paid by other attackers to help them get started.

With the Mirai source code open sourced and its effectiveness proven, more people looking for a quick buck are getting into it. With more players in the market, the price will go down. Pros will start modifying the Mirai and other code bases and it will evolve. In fact, Imperva has already detected a new 650Gbps botnet cannon whose signature differs from Mirai.

As Brian Krebs (whose site got hit by its own giant attack last year) has reported, many IoT devices have started requiring changing the default password upon setup. That’s all well and good, but people are bad at choosing passwords. Look for the next iteration of Mirai try the top 1000 most commonly used passwords. Eventually, they could use AI to guess passwords.

Also, new products don’t address old devices that users may not even remember are connected to the internet. How many thousands of small businesses have routers and printers that they haven’t really thought about for years and definitely don’t have time to think about today?

It may be old news to most of us, but researchers and experts are still sifting through the data on last week's staggering distributed denial of service attack. For those few who haven't heard, someone launched a massive DDoS attack on a domain name server--or DNS-- last Friday. This is important because DNS are responsible for translating the web addresses we humans use into data that computers and routers can understand. When a DNS goes down, computers get confused and have no idea where to go unless you manually type in the address of the site you need. Since basically none of us have that kind of information logged, it essentially tanks any site that uses that DNS. According to Geek.com, it's feasible that within short order we could see attacks large enough to take down internet exchange points, or IXPs, the backbones and hubs of virtually all web traffic on Earth. If that happened, then the potential damage could be catastrophic.

What can I do?

Not much, but this wouldn’t hurt: figure out how to get into the administrative side of every device you have connected to the internet. Turn it off. Unplug it. Turn it back on, log into the back end and change the password to something weird.

Letting your elected leaders know that you’d like to see laws and regulations that require makers of connected devices to protect the internet wouldn’t hurt, either.


"The time for war has not yet come, but it will come and that soon, and when it does come, my advice is to draw the sword and throw away the scabbard." Gen. T.J. Jackson, March 1861
Re: Did the U.S. Launch a Cyberattack on Drudge? #159984
01/07/2017 02:32 PM
01/07/2017 02:32 PM
Joined: Feb 2005
Posts: 3,151
D 057 Btn 47 FF
T
The Greywolf Offline
Senior Member
The Greywolf  Offline
Senior Member
T
Joined: Feb 2005
Posts: 3,151
D 057 Btn 47 FF
Quote
Originally posted by ConSigCor:
I bet the Russians did it. laugh
laugh laugh laugh


I believe in absolute Freedom, as little interference from any government as possible...And I'll fight any man trying to take that away from me.

Jimmy Greywolf
Re: Did the U.S. Launch a Cyberattack on Drudge? #159985
01/08/2017 05:13 PM
01/08/2017 05:13 PM
Joined: Jan 2002
Posts: 23,941
Tulsa
airforce Online content OP
Administrator
airforce  Online Content OP
Administrator
Senior Member
Joined: Jan 2002
Posts: 23,941
Tulsa
Someone has been trying to take down Drudge, but who? I'm not saying it's aliens. But it's aliens.

Quote
...only a "small number of groups" in the world have the sophistication necessary to execute an attack to take out the Drudge Report for extended periods of time.

"I would say it would be a group or nation-state that has pretty sophisticated methods and means," he said. "Given the fact it's happened a number of times and is persistent for well over a few minutes, and it's coming from multiple sources, against a site that would have a lot of protection, it would indicate it's someone pretty sophisticated."

Chris Weber, co-founder of the firm Casaba Security, explained that because the Drudge Report is "getting so much traffic already," a DDoS attack would need to be on a far "greater magnitude" to be effective against it.

"It does seem unlikely that the Drudge Report would be easily taken down or slowed significantly by a standard DDoS attack," he said. He surmised that the attack that took down the website was perhaps more on the scale of the massive cyberattack that temporarily knocked out Dyn, a large DNS company, in October 2016. WikiLeaks said its supporters were behind that attack as a show of support for the group's founder, Julian Assange.

Outside nation-states, it is equally probable that the Drudge Report has come under fire from a "hacktivist" organization, perhaps unhappy with the political views espoused by its founder.

Drudge has always been a controversial conservative figure, but in 2016 he went all-in for President-elect Donald Trump, often igniting controversy with inflammatory headlines emblazoned on his website.

But hacktivist organizations almost always take credit after a successful attack has been executed, experts said. So far, no one has claimed credit for the attacks on the Drudge Report.

And, without a group taking credit, it may be impossible to determine the culprit....
Onward and upward,
airforce


.
©>
©All information posted on this site is the private property of the individual author and AWRM.net and may not be reproduced without permission. © 2001-2020 AWRM.net All Rights Reserved.
Powered by UBB.threads™ PHP Forum Software 7.6.1.1