SlideShare a Scribd company logo
 
	
  
	
   1	
  
	
  
DDoS	
  Cyber	
  Attacks	
  Against	
  Global	
  Markets	
  
Selected	
  excerpts	
  
	
  
Prolexic’s	
  Security	
  Engineering	
  and	
  Response	
  Team	
  (PLXsert)	
  recently	
  published	
  a	
  white	
  paper,	
  DDoS	
  
Attacks	
  Against	
  Global	
  Markets,	
  which	
  shares	
  cyber	
  intelligence	
  gathered	
  from	
  nearly	
  a	
  dozen	
  
significant	
  distributed	
  denial	
  of	
  service	
  (DDoS)	
  attacks	
  against	
  financial	
  enterprises	
  and	
  the	
  market	
  
effects	
  of	
  those	
  attacks.	
  	
  
	
  
A	
  rising	
  number	
  of	
  recent	
  DDoS	
  attack	
  campaigns	
  have	
  targeted	
  the	
  financial	
  industry.	
  As	
  a	
  result,	
  
financial	
  institutions	
  are	
  anxious,	
  and	
  governments	
  are	
  considering	
  the	
  national	
  security	
  
implications	
  associated	
  with	
  digital	
  assaults	
  against	
  the	
  critical	
  economic	
  infrastructure	
  provided	
  
by	
  financial	
  firms,	
  including	
  trading	
  platforms.	
  Are	
  DDoS	
  cyber	
  attackers	
  trying	
  to	
  manipulate	
  
stock	
  prices	
  and	
  trading	
  markets?	
  The	
  DDoS	
  experts	
  in	
  PLXsert	
  think	
  so.	
  
	
  
What	
  is	
  market	
  manipulation?	
  
	
  
Market	
  manipulation	
  is	
  a	
  deliberate	
  and	
  malicious	
  interference	
  with	
  market	
  values	
  in	
  order	
  to	
  
create	
  an	
  artificial	
  price	
  for	
  a	
  tradable	
  security.	
  DDoS	
  attacks	
  can	
  be	
  used	
  to	
  attempt	
  to	
  
deliberately	
  reduce	
  the	
  availability	
  of	
  products	
  and	
  services	
  from	
  a	
  targeted	
  company	
  –	
  or	
  even	
  an	
  
entire	
  financial	
  exchange	
  platform.	
  Many	
  financial	
  companies,	
  including	
  trading	
  organizations,	
  
deliver	
  a	
  significant	
  amount	
  of	
  their	
  client	
  services	
  via	
  their	
  websites	
  or	
  via	
  web	
  applications.	
  As	
  a	
  
result,	
  even	
  though	
  a	
  victim	
  enterprise	
  might	
  not	
  suffer	
  any	
  inventory	
  or	
  physical	
  loss	
  as	
  a	
  result	
  
of	
  DoS	
  and	
  DDoS	
  attacks,	
  the	
  negative	
  consequences	
  associated	
  with	
  site	
  availability	
  and	
  investor	
  
confidence	
  may	
  be	
  substantial.	
  	
  
	
  
The	
  public	
  image	
  of	
  a	
  financial	
  service	
  firm	
  is	
  intricately	
  associated	
  with	
  its	
  cyber	
  presence,	
  and	
  
DDoS	
  attacks	
  and	
  other	
  cyber-­‐attack	
  vectors	
  can	
  modify	
  the	
  online	
  presence	
  of	
  the	
  victim,	
  which	
  
can	
  create	
  artificial,	
  false	
  or	
  misleading	
  appearances	
  –	
  a	
  hallmark	
  of	
  market	
  manipulation	
  –	
  as	
  can	
  
rumors	
  generated	
  about	
  an	
  organization	
  via	
  online	
  sites,	
  such	
  as	
  Twitter.	
  Overall,	
  PLXsert	
  has	
  
found	
  a	
  causal	
  relationship	
  between	
  cyber-­‐attacks	
  and	
  a	
  change	
  in	
  the	
  valuation	
  of	
  a	
  company	
  in	
  a	
  
given	
  market.	
  
	
  
Who’s	
  behind	
  the	
  cyber-­‐attacks	
  against	
  American	
  financial	
  institutions?	
  	
  
	
  
Significant	
  denial	
  of	
  service	
  attack	
  campaigns	
  require	
  vast	
  resources,	
  a	
  large	
  number	
  of	
  attackers,	
  
and	
  substantial	
  coordination	
  and	
  collaboration.	
  Since	
  2011,	
  and	
  growing	
  in	
  2012	
  and	
  2013,	
  DDoS	
  
attack	
  campaigns	
  have	
  become	
  a	
  significant	
  threat	
  to	
  financial	
  firms.	
  To	
  understand	
  DDoS	
  attacks,	
  
it	
  is	
  important	
  to	
  learn	
  about	
  the	
  groups	
  behind	
  the	
  attacks.	
  	
  
 
	
  
	
   2	
  
	
  
Two	
  groups	
  were	
  responsible	
  for	
  the	
  two	
  most	
  significant	
  attack	
  campaigns	
  against	
  financial	
  
markets	
  in	
  2012	
  and	
  2013.	
  The	
  Operation	
  Digital	
  Tornado	
  campaign	
  was	
  organized	
  by	
  a	
  group	
  
called	
  L0ngWave99.	
  The	
  Operation	
  Ababil	
  campaign	
  was	
  organized	
  by	
  al-­‐Qassam	
  Cyber	
  Fighters	
  
(QCF).	
  Although	
  the	
  two	
  groups	
  appear	
  to	
  have	
  distinct	
  identities,	
  there	
  is	
  also	
  a	
  record	
  of	
  them	
  
having	
  shared	
  the	
  same	
  attack	
  tools.	
  L0ngWave99,	
  QCF	
  and	
  other	
  malicious	
  actor	
  groups	
  were	
  
responsible	
  for	
  several	
  DDoS	
  attack	
  incidents	
  that	
  affected	
  stock	
  and	
  currency	
  valuations	
  or	
  
interfered	
  with	
  trading.	
  
	
  
Operation	
  Digital	
  Tornado	
  ran	
  for	
  three	
  months	
  from	
  February	
  to	
  April	
  2012.	
  In	
  this	
  campaign,	
  
L0ngwave99	
  claimed	
  responsibility	
  for	
  attacking	
  multiple	
  U.S.	
  securities	
  and	
  commodity	
  
exchanges.	
  L0ngwave99	
  claims	
  to	
  be	
  motivated	
  by	
  political	
  ideals,	
  including	
  support	
  for	
  the	
  
Occupy	
  Wall	
  Street	
  movement.	
  The	
  group’s	
  website	
  contains	
  rhetoric	
  against	
  financial	
  institutions	
  
and	
  harsh	
  criticism	
  of	
  the	
  policies	
  of	
  the	
  United	
  States	
  government	
  and	
  international	
  financial	
  
institutions.	
  
	
  
Operation	
  Ababil	
  and	
  the	
  itsoknoproblembro	
  campaign	
  ran	
  from	
  January	
  2012	
  through	
  August	
  
2013.	
  Although	
  official	
  announcements	
  and	
  claimed	
  attributions	
  began	
  appearing	
  on	
  Pastebin	
  
only	
  as	
  early	
  as	
  September	
  2012,	
  PLXsert	
  researchers	
  have	
  identified	
  through	
  Open	
  Source	
  
Intelligence	
  (OSINT)	
  that	
  the	
  DDoS	
  attack	
  campaign	
  by	
  QCF	
  had	
  been	
  ongoing	
  since	
  at	
  least	
  
January	
  2012.	
  Details	
  of	
  itsoknoproblembro	
  are	
  described	
  in	
  a	
  DDoS	
  threat	
  advisory	
  from	
  PLXsert.	
  
	
  
Get	
  the	
  full	
  white	
  paper	
  for	
  all	
  detailed	
  explanations	
  
	
  
In	
  the	
  white	
  paper,	
  PLXsert	
  shares	
  its	
  insight	
  into	
  the	
  use	
  of	
  DDoS	
  cyber-­‐attacks	
  to	
  influence	
  stock	
  
prices	
  and	
  limit	
  trading,	
  including:	
  
• Details	
  about	
  10	
  DDoS	
  attack	
  campaigns	
  and	
  their	
  market	
  effects	
  
• Insight	
  into	
  the	
  perpetrators,	
  attack	
  methods	
  and	
  their	
  public	
  statements	
  for	
  each	
  
campaign	
  
• Types	
  of	
  malicious	
  actors	
  and	
  their	
  motives	
  
• The	
  underground	
  ecosystem	
  that	
  supports	
  DDoS	
  cyber	
  attackers	
  
A	
  complimentary	
  copy	
  of	
  the	
  white	
  paper,	
  “DDoS	
  Attacks	
  Against	
  Global	
  Markets,	
  can	
  be	
  
downloaded	
  from	
  the	
  Prolexic	
  website.	
  
About	
  Prolexic	
  
Prolexic	
  Technologies	
  (now	
  part	
  of	
  Akamai)	
  is	
  the	
  world’s	
  largest	
  and	
  most	
  trusted	
  provider	
  of	
  
DDoS	
  protection	
  and	
  mitigation	
  services.	
  Learn	
  more	
  at	
  http://www.prolexic.com.	
  	
  

More Related Content

Similar to DDoS Cyber Attacks Against Global Markets | Prolexic

DDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt TechnologiesDDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt Technologies
MazeBolt Technologies
 
The Kings of Brute-Force and DDoS Meet KillNet [EN].pdf
The Kings of Brute-Force and DDoS Meet KillNet [EN].pdfThe Kings of Brute-Force and DDoS Meet KillNet [EN].pdf
The Kings of Brute-Force and DDoS Meet KillNet [EN].pdf
Overkill Security
 
Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
Qrator Labs
 
The 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations ReportThe 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations Report
- Mark - Fullbright
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Financial Institutions, Merchants, and the Race Against Cyberthreats
Financial Institutions, Merchants, and the  Race Against CyberthreatsFinancial Institutions, Merchants, and the  Race Against Cyberthreats
Financial Institutions, Merchants, and the Race Against Cyberthreats
EMC
 
20160316_tbk_bit_module7
20160316_tbk_bit_module720160316_tbk_bit_module7
20160316_tbk_bit_module7
University of Twente
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
hallettfaustina
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
Blueliv
 
the hacktivist group Anonymous Sudan [en].pdf
the hacktivist group Anonymous Sudan [en].pdfthe hacktivist group Anonymous Sudan [en].pdf
the hacktivist group Anonymous Sudan [en].pdf
Overkill Security
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
EMC
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
Jake Weaver
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
Andrey Apuhtin
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
Bankir_Ru
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 

Similar to DDoS Cyber Attacks Against Global Markets | Prolexic (20)

DDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt TechnologiesDDoS Protection For Top 4 Industries | MazeBolt Technologies
DDoS Protection For Top 4 Industries | MazeBolt Technologies
 
The Kings of Brute-Force and DDoS Meet KillNet [EN].pdf
The Kings of Brute-Force and DDoS Meet KillNet [EN].pdfThe Kings of Brute-Force and DDoS Meet KillNet [EN].pdf
The Kings of Brute-Force and DDoS Meet KillNet [EN].pdf
 
Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
 
The 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations ReportThe 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations Report
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Stickler_Unit6
Stickler_Unit6Stickler_Unit6
Stickler_Unit6
 
Financial Institutions, Merchants, and the Race Against Cyberthreats
Financial Institutions, Merchants, and the  Race Against CyberthreatsFinancial Institutions, Merchants, and the  Race Against Cyberthreats
Financial Institutions, Merchants, and the Race Against Cyberthreats
 
20160316_tbk_bit_module7
20160316_tbk_bit_module720160316_tbk_bit_module7
20160316_tbk_bit_module7
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
the hacktivist group Anonymous Sudan [en].pdf
the hacktivist group Anonymous Sudan [en].pdfthe hacktivist group Anonymous Sudan [en].pdf
the hacktivist group Anonymous Sudan [en].pdf
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

DDoS Cyber Attacks Against Global Markets | Prolexic

  • 1.       1     DDoS  Cyber  Attacks  Against  Global  Markets   Selected  excerpts     Prolexic’s  Security  Engineering  and  Response  Team  (PLXsert)  recently  published  a  white  paper,  DDoS   Attacks  Against  Global  Markets,  which  shares  cyber  intelligence  gathered  from  nearly  a  dozen   significant  distributed  denial  of  service  (DDoS)  attacks  against  financial  enterprises  and  the  market   effects  of  those  attacks.       A  rising  number  of  recent  DDoS  attack  campaigns  have  targeted  the  financial  industry.  As  a  result,   financial  institutions  are  anxious,  and  governments  are  considering  the  national  security   implications  associated  with  digital  assaults  against  the  critical  economic  infrastructure  provided   by  financial  firms,  including  trading  platforms.  Are  DDoS  cyber  attackers  trying  to  manipulate   stock  prices  and  trading  markets?  The  DDoS  experts  in  PLXsert  think  so.     What  is  market  manipulation?     Market  manipulation  is  a  deliberate  and  malicious  interference  with  market  values  in  order  to   create  an  artificial  price  for  a  tradable  security.  DDoS  attacks  can  be  used  to  attempt  to   deliberately  reduce  the  availability  of  products  and  services  from  a  targeted  company  –  or  even  an   entire  financial  exchange  platform.  Many  financial  companies,  including  trading  organizations,   deliver  a  significant  amount  of  their  client  services  via  their  websites  or  via  web  applications.  As  a   result,  even  though  a  victim  enterprise  might  not  suffer  any  inventory  or  physical  loss  as  a  result   of  DoS  and  DDoS  attacks,  the  negative  consequences  associated  with  site  availability  and  investor   confidence  may  be  substantial.       The  public  image  of  a  financial  service  firm  is  intricately  associated  with  its  cyber  presence,  and   DDoS  attacks  and  other  cyber-­‐attack  vectors  can  modify  the  online  presence  of  the  victim,  which   can  create  artificial,  false  or  misleading  appearances  –  a  hallmark  of  market  manipulation  –  as  can   rumors  generated  about  an  organization  via  online  sites,  such  as  Twitter.  Overall,  PLXsert  has   found  a  causal  relationship  between  cyber-­‐attacks  and  a  change  in  the  valuation  of  a  company  in  a   given  market.     Who’s  behind  the  cyber-­‐attacks  against  American  financial  institutions?       Significant  denial  of  service  attack  campaigns  require  vast  resources,  a  large  number  of  attackers,   and  substantial  coordination  and  collaboration.  Since  2011,  and  growing  in  2012  and  2013,  DDoS   attack  campaigns  have  become  a  significant  threat  to  financial  firms.  To  understand  DDoS  attacks,   it  is  important  to  learn  about  the  groups  behind  the  attacks.    
  • 2.       2     Two  groups  were  responsible  for  the  two  most  significant  attack  campaigns  against  financial   markets  in  2012  and  2013.  The  Operation  Digital  Tornado  campaign  was  organized  by  a  group   called  L0ngWave99.  The  Operation  Ababil  campaign  was  organized  by  al-­‐Qassam  Cyber  Fighters   (QCF).  Although  the  two  groups  appear  to  have  distinct  identities,  there  is  also  a  record  of  them   having  shared  the  same  attack  tools.  L0ngWave99,  QCF  and  other  malicious  actor  groups  were   responsible  for  several  DDoS  attack  incidents  that  affected  stock  and  currency  valuations  or   interfered  with  trading.     Operation  Digital  Tornado  ran  for  three  months  from  February  to  April  2012.  In  this  campaign,   L0ngwave99  claimed  responsibility  for  attacking  multiple  U.S.  securities  and  commodity   exchanges.  L0ngwave99  claims  to  be  motivated  by  political  ideals,  including  support  for  the   Occupy  Wall  Street  movement.  The  group’s  website  contains  rhetoric  against  financial  institutions   and  harsh  criticism  of  the  policies  of  the  United  States  government  and  international  financial   institutions.     Operation  Ababil  and  the  itsoknoproblembro  campaign  ran  from  January  2012  through  August   2013.  Although  official  announcements  and  claimed  attributions  began  appearing  on  Pastebin   only  as  early  as  September  2012,  PLXsert  researchers  have  identified  through  Open  Source   Intelligence  (OSINT)  that  the  DDoS  attack  campaign  by  QCF  had  been  ongoing  since  at  least   January  2012.  Details  of  itsoknoproblembro  are  described  in  a  DDoS  threat  advisory  from  PLXsert.     Get  the  full  white  paper  for  all  detailed  explanations     In  the  white  paper,  PLXsert  shares  its  insight  into  the  use  of  DDoS  cyber-­‐attacks  to  influence  stock   prices  and  limit  trading,  including:   • Details  about  10  DDoS  attack  campaigns  and  their  market  effects   • Insight  into  the  perpetrators,  attack  methods  and  their  public  statements  for  each   campaign   • Types  of  malicious  actors  and  their  motives   • The  underground  ecosystem  that  supports  DDoS  cyber  attackers   A  complimentary  copy  of  the  white  paper,  “DDoS  Attacks  Against  Global  Markets,  can  be   downloaded  from  the  Prolexic  website.   About  Prolexic   Prolexic  Technologies  (now  part  of  Akamai)  is  the  world’s  largest  and  most  trusted  provider  of   DDoS  protection  and  mitigation  services.  Learn  more  at  http://www.prolexic.com.