Anonymous tests nasty new Denial of Service attack tool

first_imgUntil the last few months, most of the Internet-using public hadn’t heard of Anonymous or distributed denial of service attacks, either. While both Anonymous and DoS have been bandied about with reckless abandon in the press in recent months, most people still don’t have any idea what they’re all about.Recently, the anti-security forces have been running wild on FBI-related targets, taunting the U.S. agency and breaking into big-name contractors like Mantech to harvest emails and user credentials. The un-group has also played havoc with sites like Mastercard and PayPal by overloading their servers with global barrages from LOIC.Now it looks as though Anonymous is ready to ramp up its attacks with a bigger, better DoS weapon. Right now, Anonymous is putting the finishing touches on RefRef. Like a lot of other applications, RefRef is moving from the desktop to the cloud, built using JavaScript and targeting unpatched web servers — and as we’ve already seen this year, there are a lot of people who should know better that are running old, unpatched servers.According to its developer, RefRef causes a server to “eat itself apart,” something Pastebin saw first hand. It’s the same vulnerability that caused Sony so much grief earlier this year, and it makes for a very effective attack vector. After sending two packets from a browser (desktop or mobile), the server turns its processing power against itself. Following a 17-second RefRef test against its servers, Pastebin experienced a 42 minute outage while its servers recuperated.While RefRef certainly looks like a nasty little tool, it’ll be interesting to see whether its users can be tracked as easily as those who used LOIC. PayPal just turned over a list of more than 1,000 attackers to the FBI who figured they were anonymously participating in the attack against the payment processor.via The Hacker Newslast_img read more

Learn more →