Sunday Star-Times

DDoS attackers might get nothing but a date with justice

New Zealand may be the winner if criminals behind the assault on the NZX walk away empty-handed. By Tom Pullar-Strecker.

-

The NZX and MetService may be feeling some measure of embarrassm­ent after their websites were knocked offline by distribute­d denial-ofservice attacks over the past couple of weeks.

But if some experts are right, it is the attackers themselves who may look like the real amateurs when they walk away out-of-pocket, and with several spy agencies on their backs.

Distribute­d denial-of-service (DDoS) attacks involve cybercrimi­nals overloadin­g and crashing an organisati­on’s online services by bombarding their internet-facing systems with vast amounts of spurious traffic.

The NZX’s attackers – assuming it is one group – have targeted an eclectic mix of Kiwi organisati­ons.

Westpac revealed it fought off a DDoS attack in mid-August.

Spokeswoma­n Max Bania said ‘‘a small number of customers’’ might have experience­d intermitte­nt issues logging in for a short period but that was resolved quickly.

TSB experience­d disruption to its banking services on Tuesday, though it has not said whether it was the target of a DDoS attack.

Media companies Stuff and RNZ confirmed they had experience­d attacks which they had successful­ly defended.

Bizarrely, the Mt Ruapehu skifield also appears to have been targeted. Its car-park booking system was

1 terabit per second

Volume of spurious data at peak of DDoS attack on the NZX

2.3Tbps

World’s largest known attack ‘‘deliberate­ly crashed by an external cyberattac­k’’ on Wednesday morning.

But it was the NZX that bore the brunt.

The attack on its infrastruc­ture is understood to have peaked at more than 1 terabit per second of spurious data.

It may not have been far shy of the largest-ever reported DDoS attack globally, a 2.3Tbps assault on a customer of cloudcompu­ting giant Amazon Web Services in February.

Sean Duca, Sydney-based regional chief security officer of United States cyber security firm Palo Alto Networks, said it was more common for attacks to peak at about a fifth of a terabit, or 200 gigabits per second.

DDoS attacks have been used in the past as a form of civil disobedien­ce.

In 2012, activists associated with hacking group Anonymous vented their outrage at Kim

Dotcom’s arrest in New Zealand by temporaril­y blocking access to the websites of the FBI, US Justice Department and recording label Universal Music Group.

Anonymous also disrupted the New Zealand Parliament website for two days in 2011 to protest against a copyright law change.

They can also have political goals.

The entire country of Estonia was largely knocked offline in 2007 during a period of high tensions with neighbouri­ng Russia.

But the latest DDoS attacks on New Zealand appear to be financiall­y-motivated, based on emails and ransom demands sent to at least some victims, including the NZX.

The attacks may be part of a global campaign that New Zealand cyber-security agency Cert NZ first warned about in November last year that threatened financial services businesses around the world.

According to internet infrastruc­ture giant Akamai, the group that prompted that warning has also attacked payment services PayPal and WorldPay and an Indian bank.

It reported the criminals were demanding ransoms in bitcoin of tens or hundreds of thousands of dollars to forestall or call off their attacks.

Duca said businesses brought to their knees by the much more serious scourge of ransomware hacks could be inclined to pay

‘‘I think it is an ingrained thing in New Zealand . . . ‘I’d rather fight you even if it costs me more’.’’ Bruce Armstrong Director of Wellington cyber security company Darkscope

ransoms to unlock their data and prevent it being auctioned on the internet, even though paying such ransoms was ‘‘unethical’’.

He had also heard ‘‘third hand’’ of organisati­ons in Australia paying blackmail demands to save themselves from a denial-of-service attack, but not of any in New Zealand doing so.

Bruce Armstrong, director of Wellington cyber security company Darkscope, believed there was little chance of any New Zealand organisati­ons paying off the current DDoS attackers.

‘‘I suspect anyone who is presented with a ransom note in New Zealand is likely to seek help rather than pay it,’’ he said. ‘‘Look at our corruption rates. ‘‘I think it is an ingrained thing in New Zealand; ‘Why should you collect just because you can ransom me? I’d rather fight you even if it costs me more’,’’ Armstrong said.

GCSB Minister Andrew Little has cautioned that it is ‘‘never ethical’’ to pay a cyber ransom and has opened the door just a little to considerin­g a legal ban on such payments.

He forecasts the attacks will simply ‘‘fizzle out’’ as the attackers’ victims get better at blocking the spurious traffic being thrown at them and shore up their systems.

Armstrong agrees, assuming no-one lets the side down by paying a ransom.

‘‘It may fizzle out if the attackers are unsuccessf­ul getting any ransoms and I don’t think to date they have been successful. There are easier places to go,’’ he said.

No-one knows how long that message may take to get through to the attackers.

But in the meantime they will be chewing through small amounts of cash, as well as hopefully banging their head against a brick wall.

Usually, DDoS attackers will hire a network of hacked computers or ‘‘botnets’’ through the dark web to launch their attacks, paying by the hour or day for a certain amount of bandwidth.

An attack peaking at 1Tbps would be likely to require at least tens of thousands of hijacked devices.

Duca said about 190,000 hacked IPTV cameras (cameras that are connected to the internet), were harnessed by criminals and used to conduct another terabit-scale DDoS attack in 2016 that took down large parts of the internet on the US east coast.

Jonathan Sharrock, chief executive of New Zealand-based online security testing firm Cyber Citadel, believed botnets capable of delivering a typical DDoS attack could be rented for about US$60 (NZ$89) a day.

That would put the total cost of the bigger, sustained DDoS attacks New Zealand has experience­d over the past few weeks at perhaps in the thousands of dollars.

Aside from shoulderin­g that loss, the attackers now have the GCSB and its Five Eyes partner agencies on their case.

Little said last week that the only clue they had to the identity of the attackers was their email demands to victims.

A security expert said it might be possible to prove who was behind the attack by examining the devices that were part of the botnet, finding out who controlled them, and then working back to who hired them.

DDoS attacks reportedly more than halved after the FBI acted in 2018 to shut down 15 of the most active websites that sold control over botnets – the latest in a series of sporadic actions to take the fight back to attackers.

Where any trail might lead this time, no-one knows.

Duca said a peak of more than 1Tbps suggested the NZX attack was more than just the work of one person.

‘‘It would be more akin to a group than an individual.

‘‘When you start to look at the larger campaigns, it needs to be planned and methodical. It is not someone ‘shooting from the hip’, so to speak.’’

 ?? TOM LEE/STUFF ?? The Mt Ruapehu skifield was an unlikely target of the cyberattac­ks. Others include Westpac, Stuff Media, the NZX and MetService.
TOM LEE/STUFF The Mt Ruapehu skifield was an unlikely target of the cyberattac­ks. Others include Westpac, Stuff Media, the NZX and MetService.
 ??  ??
 ?? ROBERT KITCHIN/STUFF ?? GCSB Minister Andrew Little won’t rule out a law against paying cyber ransoms.
ROBERT KITCHIN/STUFF GCSB Minister Andrew Little won’t rule out a law against paying cyber ransoms.

Newspapers in English

Newspapers from New Zealand