This is an academic paper from Tewnte University in the Netherlands.
It claims that the tools used by Anonymous did not provide adequate security. On November 28, 2010, the world started watching the whistle blower website WikiLeaks to begin publishing part of the 250,000 US Embassy Diplomatic cables. In fact, a cyberwar started just before the initial release. Wikileaks has reported that their servers were experiencing distributed denial-of-service attacks (DDoS). Several companies started severed ties with WikiLeaks: Amazon and EvertDNS removed the WikiLeaks web- site from their servers. Swiss bank PostFinance froze the WikiLeaks assets and Mastercard and Visa. Anonymous started a retaliation against PostFinance, PayPay, MasterCard, Visa, Moneybrookers.com and Amazon.com, named "Operation Payback".
The paper describes how the Anonymous group consists of volunteers that use a stress testing tool to perform the attacks. This tool, named LOIC (Low Orbit Ion Cannon), can be found both as a desktop application and as a Web page. Even though the group behind the attacks claims to be anonymous, the tools they provide do not offer any security services, such as anonymization. As a consequence, a hacktivist that volunteers to take part in such attacks can be traced back easily. This is the case for both current versions of the LOIC tool., The goal of the report is to present an analysis of privacy issues in the context of these attacks, and raise awareness on the risks of taking part in them. (Aiko Pras, 2010)
Works Cited Aiko Pras, A. S. (2010). Attacks by "Anonymous" WikiLeaks Proponents not Anonymous. Retrieved April 6, 2011, from University of Twente: http://doc.utwente.nl/75331/
This is an academic paper from Tewnte University in the Netherlands.
It claims that the tools used by Anonymous did not provide adequate security. On November 28, 2010, the world started watching the whistle blower website WikiLeaks to begin publishing part of the 250,000 US Embassy Diplomatic cables. In fact, a cyberwar started just before the initial release. Wikileaks has reported that their servers were experiencing distributed denial-of-service attacks (DDoS). Several companies started severed ties with WikiLeaks: Amazon and EvertDNS removed the WikiLeaks web- site from their servers. Swiss bank PostFinance froze the WikiLeaks assets and Mastercard and Visa.
Anonymous started a retaliation against PostFinance, PayPay, MasterCard, Visa, Moneybrookers.com and Amazon.com, named "Operation Payback".
The paper describes how the Anonymous group consists of volunteers that use a stress testing tool to perform the attacks. This tool, named LOIC (Low Orbit Ion Cannon), can be found both as a desktop application and as a Web page. Even though the group behind the attacks claims to be anonymous, the tools they provide do not offer any security services, such as anonymization. As a consequence, a hacktivist that volunteers to take part in such attacks can be traced back easily. This is the case for both current versions of the LOIC tool., The goal of the report is to present an analysis of privacy issues in the context of these attacks, and raise awareness on the risks of taking part in them. (Aiko Pras, 2010)
Works Cited
Aiko Pras, A. S. (2010). Attacks by "Anonymous" WikiLeaks Proponents not Anonymous. Retrieved April 6, 2011, from University of Twente: http://doc.utwente.nl/75331/