UK, Not North Korea, Is Source of DDoS Attacks 175
angry tapir writes "The UK was the likely source of a series of attacks last week that took down popular Web sites in the US and South Korea, according to an analysis performed by a Vietnamese computer security researcher. The results contradict assertions made by some in the US and South Korean governments that North Korea was behind the attack. Security analysts had been skeptical of the claims, which were reportedly made in off-the-record briefings and for which proof was never delivered." The Vietnamese security site's blog is linked from the article, but it is very slow even before Slashdotting. The researchers observed 166,908 zombies participating in the attacks — a number far larger than most earlier estimates.
Update: 07/14 21:24 GMT by KD : Wired is reporting that the UK owner of the IP address in question is pointing a finger at a server in Florida, which it says opened a VPN to the UK machine for the attacks. Once again, the attacker could be anywhere.
Update: 07/14 21:24 GMT by KD : Wired is reporting that the UK owner of the IP address in question is pointing a finger at a server in Florida, which it says opened a VPN to the UK machine for the attacks. Once again, the attacker could be anywhere.
However.... (Score:3, Funny)
Re: (Score:2)
The packets I saw were coming from the US. Maybe it was something different.
Re: (Score:3, Informative)
RTFA: Zombies. Botnet.
It takes coordinated digging to follow the botnet control channel upstream, especially if the botnet runs disconnected the vast majority of the time.
As a target, you would only see packets from the particular bot that was dosing you.
Re: (Score:3, Insightful)
A C&C server is just another botnet PC that has additional software on it to tell other bots what to do. The human controller logs into their hacked C&C server and programs the instructions for the bots to pull down. You really think the botnet controllers are stupid enough to host their own Command and Control servers at their own site?
Re: (Score:3, Interesting)
You can't spoof an IP thru a router you don't control.
The router immediately upstream of your bot always knows where the packet came from regardless of what IP you might try to force into said packet.
Re: (Score:2, Insightful)
You can't spoof an IP thru a router you don't control.
It depends upon what you mean. You *can* send a package with a forged source IP through a router you don't control. It requires that nothing filter on the "bad" source IP (which is still far too common, from what I've read). This also would never get a successful TCP connection; you could send a SYN this way but the ACK would never get back to you (it would be sent to the forged source instead).
But this can be enough for a DOS.
Honestly, though, I'm not sure how important source IP spoofing is nowada
Re:However.... (Score:4, Informative)
Well, it sort of is. The IP datagram specifies the source ("from") and destination ("to") IP addresses (1) [wikipedia.org]. (The IP address identifies a connection to the internet; on the "local" side of that connection there may be only one computer or there may be a network of computers; if there is more than one computer, the router has to be set up to know which computer to forward packets to, either by configuring it to open certain incoming ports to one computer or by establishing a connection from that computer going out, which the router can then keep open for the duration of the connection.)
However the source/destination ports are actually specified in the TCP headers (2) [wikipedia.org]. Ports are typically thought of as representing which service on the destination computer is being requested (HTTP, FTP, SMTP, etc.), but the port will also help the router in a multi-computer network route incoming packets, e.g. a rule may be set to route all packets addressed to port 80 to a particular computer which is set up to serve web pages (port 80 is the standard port on which all web servers "listen" for connections); packets addressed to port 25 on the other hand can be routed to a computer set up to run the e-mail system (port 25 is used by SMTP servers), which may not be the same computer as the one running the HTTP server. The TCP headers are followed by the data, and together the TCP headers/data form the data portion of the IP layer's datagram.
If the return IP is incorrect, you'll never get a response, of course. Since there's no legitimate reason to do this, and since the IP datagram is a standard format, modems/routers can be programmed to check the packets and ensure that the "from" IP is, in fact, correct.
Re: (Score:3, Funny)
The only assurance that the alleged sourcing network is legitimate is that the true sourcing network is properly filtering out emigrating martians. Not all networks do their part here, and any network far enough up the hierarchy soon can make few if any assumptions about where their packets come from.
Re: (Score:2)
The traffic may have been coming from the UK and US, but it was Kim-Jong Il who posted the links to the sites on slashdot, thereby bringing the sites to their knees!
Re: (Score:2)
North Koreans are still told that the mighty leader Kim-Jong Il brought down the evil western internet.
You mean it was the Queen who did it? Or was it Charles?
Re: (Score:2)
Oh? (Score:2, Insightful)
Why should we believe this report over the other ones? Slashdot mentality always seems to be that any contradicting reports beat the initial report.
Re:Oh? (Score:5, Insightful)
Even if it was an attack ordered by North Korea, there's no chance the actual payloads originated there. You could likely fit all of NK's network on a Class C without NAT and have room to spare.
Re:Oh? (Score:5, Funny)
Outlaw Class C Networks (Score:2)
Then I say we outlaw Class C networks. Then only criminals will have Class C networks.
Put anyone with a Class C on the Really Bad Guy Axis of Evil Terrorist Country list.
Maybe we can get a judge in Kentucky to seize [pocketfives.com] all the Class C networks. Then, we can nuke Kentucky.
Re: (Score:2)
Sir,
Your attempt on comedy was not humourous but, rather, flatulent. Maybe you should try something less serious than humour as a career: have you ever considered running for the Senate?
Cordially,
So! I knew that! (Score:2)
So, what you're saying is that North Korea controls the United Kingdom?
Damn, I always thought that was the case - that would explain all their animosity towards the Irish -- after all, the North Koreans have always been jealous of Guinness.
Now I understand everything........except why do dogs turn their heads away when you blow lightly in their faces, yet will always hang their heads out of an auto window when the car is going over 100 miles per hour?
I dare you to try to explain that one.....
Re: (Score:3, Insightful)
The point here is that new information was presented which might help find the real "bad guys." I don't see how this "beats" the first report.
Re:Oh? (Score:5, Insightful)
Slashdot mentality always seems to be that any contradicting reports beat the initial report.
No it doesn't.
(waits for the +5 insightful mod)
Re:Oh? (Score:5, Funny)
Well this isn't an argument!
Re:Oh? (Score:5, Funny)
Re: (Score:2)
This is abuse, you stupid git.
Re: (Score:2)
Re: (Score:3, Funny)
This report uses actual evidence! (A strange concept in the US, i know)
Re: (Score:2)
Re: (Score:3, Interesting)
Evidence is only as good as the people obtaining it.
No, it is only as good as the number of people who will believe it.
Re: (Score:2)
Re: (Score:2)
Evidence can be good and still not believed.
Just ask Galileo.
More to the point, evidence that contradicts dogma is likely to be discounted no matter how good it is. Such as evidence of how good Windows 7 is being posted here on slashdot. Or a negative report against the Air being posted on apple's forums.
Brilliant.. (Score:2)
Re: (Score:2)
ERM, no evidence is as good as the evidence is.
Facts are as valid as they are, it doesn't matter if a compulsive liar tells you the sky is blue, his past history of compulsive lying doesn't affect weather the sky is blue or not.
It never matters where you get your evidence/facts/data if you can verify it yourself, assuming nobody you trust can find the evidence valid/invalid themselves *then* (and only then) would evidence only be as good as the people obtaining it.
Re: (Score:2)
Slashdot mentality always seems to be that any contradicting reports beat the initial report.
We know the Romulans are behind everything, it's how they incite war.
Inflammitory headline (Score:5, Insightful)
The article has no real indication that anything was the source, just that the last hop the analyst was able to track was in the UK...which means?
Acronym peeve (Score:2)
(off topic)
Why have British/Australian journalists never been taught a consistent policy for capitalizing acronyms? Many a British article refers to NATO as Nato, and NASA as Nasa. This FA defines an acronym "Bkis" thusly:
Bach Khoa Internetwork Security (Bkis)
And yet the same article refers to PCs, not Pcs, and DDOS attacks, not Ddos attacks. It's maddening.
Re: (Score:2, Interesting)
British/Australian journalists might be a bit more flexible with the language. You can say 'Nato' and 'Nasa'. They've practically become words in their own right. This isn't the case for DDoS and PC though. You can't pronounce them as anything other than initialisms, which is exactly what they are. It's only an acronym if it forms a word. KGB, CIA, KFC - initialisms. LASER, SCUBA, SeAL - acronyms.
Re: (Score:2)
Maybe British/Australian journalists do a tiny bit of additional research to find out how an organisation writes its own name and use that format, while American journalists follow the grand tradition of expecting the world to conform to their own particular idiosyncrasies. Zing!
Seriously, look at the blog [bkis.com] in question and see if you still think it's inappropriate to refer them as Bkis. At most, it seems a bit pointless to explain what it stands for.
Re:Inflammitory headline (Score:5, Informative)
Ssssshhhh, facts spoil the fun. The original blog post [bkis.com] -however - claims that the IP address they tracked is indeed the master server, that it is located in UK and is running on Windows 2003 Server Operating System. So on the basis of that post, the UK would have to be regarded as the source. It would be interesting to see whether this claim can be verified or at least substantiated, but it seems to be more supported by facts than any other claim I heard.
Re: (Score:2, Informative)
Come on, UK! (Score:5, Funny)
Re:Come on, UK! (Score:5, Funny)
For the love of Heaven! The war has been over for 226 years! Get over it, already!
They are over the American Revolution. This is their response for us creating the "Three's Company".
Re:Come on, UK! (Score:4, Funny)
They are over the American Revolution. This is their response for us creating the "Three's Company".
Well, wikipedia says [wikipedia.org] that was a remake of a British sitcom, so... we're sorry?
Re: (Score:2)
They are over the American Revolution. This is their response for us creating the "Three's Company".
"Absolutely Fablulous."
Dom & Bom, anyone?
Re: (Score:2)
They are over the American Revolution. This is their response for us creating the "Three's Company".
Now, now. The United States government has apologized for "Three's Company" on many occasions.
Re: (Score:2)
Re: (Score:2, Informative)
Re:Come on, UK! (Score:4, Funny)
Come on! He went through the American school system.
It's not his fault. Give the guy a break!
Re: (Score:2)
Re: (Score:2)
"You guys"? You must think I'm British. Why would you think that? Oh....you saw my URL, and assumed London = London, England.
You do realize there are cities called London in various other countries throughout the world, yes?
In fact, there are 46 settlements of various sizes named London on 6 continents.
Perhaps you went through the American school system, also?
Oh...by the way:
Wooosh.
Re:Come on, UK! (Score:4, Funny)
You can have your stupid country we just want Hugh Laurie and Jon Oliver back!
p.s we'd settle for getting rid of Madonna and their being a court injunction against her using that stupid British accent!
UK vs US war with actors (Score:3, Informative)
Hugh Laurie STAYS in USA!
Send Stephie Fry STAYS too.
We also want Alan Davies and Caroline Quentin.
Wait? are there any good actors in USA to trade to UK?
OK, Here is the deal! You get them all back, if you promise to make Aland Davies the next Doctor Who.
Madonna we ship to North Korea! Oops, That is a violation of the rules of war. WMD used on civilians.
Re: (Score:2)
I enjoyed her performance in Johnathan Creek and Blue Murder.
Not your cup of tea?
Re: (Score:2)
Who controls the botnets. (Score:5, Funny)
Just because most of the IP's involved were from the UK does not mean that N.Korea wasn't responsible.
I have to wonder how one 'creates' such a geography specific botnet. Do they have UK spam with words like bollocks? Or in the USA is it 'gun porn'? I bet they use 'Tim Hortons' to catch the Canadians. =)
Re: (Score:2, Insightful)
Actually, RTFA shows that South Korea had the most bots followed by the US, and then China, Japan, and Canada.
The security researcher found what he has described to be the "master server" that gave orders to the botnet, which was traced to a UK Company. I think it's fairly likely, assuming this is true, that the attack was based from a UK server even if the perpetrator is not from the UK.
Re: (Score:2)
I keep getting told I can increase the number of doughnuts I can carry, but never gave much thought to it..
If true (Score:5, Interesting)
If true, this is kind of like the time the US accused North Korea of creating really authentic-looking counterfeit 100 dollar bills, and then it turned out that they are probably coming from within the US - possibly from the CIA to fund covert operations.
I hate to say it, but maybe Kim Jong Il isn't crazy when he claims the Western governments are part of a big conspiracy to falsely ruin his image (hah!)
Re:If true (Score:4, Insightful)
If true, this is kind of like the time the US accused North Korea of creating really authentic-looking counterfeit 100 dollar bills, and then it turned out that they are probably coming from within the US - possibly from the CIA to fund covert operations.
Please, if the CIA, or NSA maybe FBI, wanted to print their own money they would just duplicate the machines from the U.S. Mint by either: stealing the machines, stealing the plans, getting the plans from the manufacturer, etc. There's plausible deniability built right into the extra money showing up too, most of their budget is deemed classified and not every official has access to it.
No they wouldn't (Score:2)
Because they would then not be able to tell that the bills were counterfeit.
The trick is they would need bills good enough to not be detected as counterfeit by NOrth Korea, but would be detectable back home as counterfit.
Re: (Score:2)
Re: (Score:2)
"Please, if the CIA, or NSA maybe FBI, wanted to print their own money they would just duplicate the machines from the U.S. Mint "
Yes, that is one reason why the accusations are being made. Look up "superdollars" - the bills are considered virtually indistinguishable from real dollars. It is plausible that the CIA has an exact copy of the money making machines used by the bureau of printing and engraving to sidestep the need for external funding.
Re: (Score:2)
And yet the only thing crazier than that bio is the idea that North Korea, a country insanely rigorous about information control, has the wherewithal to pull this off. The amount of computers they have with solid internet connections is probably less than 100.
Next thing you'll tell me is that their super collider is almost complete and any day now they'll finish their quantum computer.
d
Where != Who (Score:5, Insightful)
Even if they attacks were proven to come from the UK... even if they came from North Korea, Nigeria, or Witchita KS..
Does that really tell us about the culprit? It just tells us from where the attacks were launched. This could be because the attacker is from that area, or because the attacker wants to appear to be from that area.
It's a clue. Nothing more.
Re: (Score:2)
according to an analysis performed by a Vietnamese computer security researcher. The results contradict assertions made by some in the US and South Korean governments that North Korea was behind the attack
I'll believe it when it is verified by another country... a report coming from Korea trying to take the blame off of Korea does not hold valid to me until I see further proof. No offense, maybe they are right, but this isn't newsworthy yet.
Re:Where != Who (Score:4, Funny)
Hate to tell you this, but Korea and Vietname are two different countries.
Re: (Score:2)
Even if they attacks were proven to come from the UK... even if they came from North Korea, Nigeria, or Witchita KS..
Does that really tell us about the culprit?
Well, yes, actually. If it was from Nigeria, they'd just want some help recovering their money from off-shore accounts.
Re: (Score:2)
Of course, most people are clueless, so a clue does them no good. The entire attack could have been coordinated by some pimple faced kid in downtown Wichita, Ks.
"YO, Dawg!! Look what I can do with all those scripts you told me were just STOOOPED SHITZ!! I R H4X0rZ 133Tz!"
Response (Score:5, Funny)
Fortunately, we can count on the British government to respond with reasoned caution, and with the utmost respect for citizens' future privacy and freedom.
Re: (Score:2)
Oi-watch it! They've got a camera watching you slag them off you know!
Source (Score:2)
I'm fairly certain that just because a server in the UK was controlling the botnet, that doesn't necessarily mean a Brit was controlling that server, nor does it rule out that a North Korean was behind it.
Re: (Score:2)
Re: (Score:2)
I would be very surprised if North Korea cared at all about the Internet and US government sites.
N.K. are testing LONG RANGE WEAPONS! I'm sorry but the culprit is most likely a script kiddie out of high-school with too much time on their hands and wanting to prove something to his l33t buddies.
A similar discussion occured here on /. previously (Score:5, Interesting)
In April of this year, the NYPD accused hackers in China, and some in the government and media even accused the Chinese government of being involved, in the hacking and disruption of the NYPD computer system. However many posters in the /. comment sections of the posted story theorized that the hacking was not originating from China but rather from a hacking group operating out of New York but fooling the NYPD using 'bot herding'.
I'm not familiar with how to operate and disguise a botnet to look like your hacking from IPs from another country, I would guess that you just infect a group of computer abroad, and run a botnet from there. Here's the original post on /. with comments modified to 4. Just scroll down and you can find posters discussing how the NYPD and U.S. government had misidentified who the hackers probably were.
http://slashdot.org/comments.pl?threshold=4&mode=flat&commentsort=0&op=Change&sid=1209793 [slashdot.org]
Here's the comment that I remembered the most where the user specifically wrote that the hackers were operating most likely within the U.S. and not in China.
http://slashdot.org/comments.pl?sid=1209793&cid=27694281 [slashdot.org]
I guess until governments learn how to trace hackers properly we are going to be seeing more and more of these stories.
28 days (Score:2)
Were the zombies filled with rage?
Still Useful (Score:2)
Master Server Location != Controller (Score:3, Informative)
The researcher found the computer that was used as the entry point for commands into the botnet.
This has nothing to do with who is responsbile for the attack.
Why would NK do it? (Score:3, Funny)
RS
We've waited for 50 years... (Score:5, Funny)
And now we want our Empire back...
I just can't believe that they've blown our cover so soon, I thought that dragging America into end-less wars in Iraq and Afghanistan was a brilliant move (did you seriously think that BUSH came up with the idea?) and the latest shift towards economic desolation via cyber attacks was extremely well thought out.
And why can we do this.... Because WE HAVE A FLAG [youtube.com]!
Okay back to plan B of being crap at sports we invent but quite polite about losing.
Re: (Score:2)
Tut
Re: (Score:2)
Okay back to plan B of being crap at sports we invent but quite polite about losing.
Have you been to a football match? Those guys are anything but "quite polite".
I think it is obvious. (Score:2)
Regardless of Country of origin (Score:4, Interesting)
I would think once it was determined that this was not a State sponsored attack, they would stop making such a stink over what country the attacks originated from. Hacking has been going on for 20 + years now, and it has never been a real concern before on the country of origin because State sponsored hacking was such a negligable issue that it was commonly overlooked. I do understand that Russia may have sponsored attacks on Georgia, and maybe China has hacked Taiwan and vice versa, but I mean, short of a concerted Government led effort, I would take this as just another case of Bot Net owner playing with his toys. Not as a sign of intra Governmental hacking as a precursor to some sort of overt warlike effort beginning.
Oh crap...... (Score:2)
UK Terror Attack (Score:3, Funny)
Re: (Score:3, Insightful)
The invasion of Beetles was German. The invasion of the Beatles was British. Get your facts straight.
Re: (Score:2)
The invasion of Beetles was German.
I thought it was Japanese. [wikipedia.org]
Re: (Score:3, Insightful)
As previously Beetles America invasion failed, they now are trying with Zombies. Whats next? Vampires? Werewolves?
A London Werewolf in America? King Arthur's Court in a Connecticut Yankee? Your peanut butter in my chocolate? These sound like things better left in Soviet Russia!
The enemy of my enemy is my friend. (Score:2)
Sore arm (Score:2)
Oh dear, looks like poor Alan Johnson will be up all night approving extradition warrants.
He can save time by not reading them, because it seems the stupid bitch who preceded him [guardian.co.uk] never bothered.
No eGulf-of-Tonkins, please (Score:4, Insightful)
Memo to "some" in the US and South Korean governments: so please be careful in future of making loose claims about North Korea doing bad stuff, unless you're sure. We don't need any Gulf of Tonkins and mobile bacteriological weapons labs. Wars have been started over less; indeed, two have. North Korea is scary enough; let's not start seeing it behind every tree.
Re: (Score:2)
Plausible (Score:2)
Re:Proxy? (Score:5, Insightful)
Just secure your shit against DDoS attacks? Its not like they forgot to apply the "anti-ddos patch". Dealing with an attack from 100k+ hosts isn't something to be taken lightly. Its expensive (get a really fat pipe) and time consuming (identify and block attack traffic).
Re:Proxy? (Score:5, Funny)
Re: (Score:2)
Well, that would certainly drop the "distributed" part of DDoS.
Re: (Score:2)
Every time I get DDoS attacks I stop being DDoSed and start being awesome instead. True story!
Re: (Score:2)
Re: (Score:2)
Dude! I'd pay $200 for a $100 bill made by a 4 year old that could pass muster as the legitimate thing.
Re: (Score:2)
Re: (Score:2)
Interesting point. So is slashdotting effectively a DDOS? The only difference is the intention and maybe the duration otherwise, the effect are almost identical.
Re:Don't worry, the government has a plan! (Score:4, Informative)
Cue UK government announcing multi billion plan to make the internet 'safe' with new content filtering, anti-filesharing and communication logging schemes in 5... 4... 3...
uhh, they already did that.
(well except for the '£billions' part, which they passed-on to the ISPs so it wouldn't appear in the budget defecit)
Re: (Score:2)
Cue UK government announcing multi billion plan to make the internet 'safe' with new content filtering, anti-filesharing and communication logging schemes in 5... 4... 3...
Someone obviously does not keep up with current events. Most UK ISP's already filter content to keep the world safe from kiddie porn and 70's album covers.
http://www.theregister.co.uk/2008/12/07/brit_isps_censor_wikipedia/ [theregister.co.uk]
http://en.wikipedia.org/wiki/Internet_Watch_Foundation [wikipedia.org]
http://www.wired.co.uk/wired-magazine/archive/2009/05/features/the-hidden-censors-of-the-internet.aspx [wired.co.uk]
Couple that with Libel laws that are routinely used as a method of silencing what should be protected as free speech:
http://www.sensea [senseaboutscience.org.uk]