SlideShare a Scribd company logo
1 of 3
Download to read offline
DDoS attacks
in FX –
taking steps to protect your
bandwidth and IT resources
by Dick Pirozzolo
148 | april 2016 e-FOREX april 2016 e-FOREX | 149
SECURITY
Last year’s wave of DDoS attacks on financial institutions that targeted forex
brokers and banks in particular, renewed worries over cyber security and whence
the next attack will come. These attacks were particularly worrisome for the
foreign exchange industry. As of last year, everyone has been on guard —
especially trading infrastructure companies, software platform providers, forex
brokers and traders who count on reliability and security to conduct their business.
DDos or Distributed Denial
of Service attacks are crude
assaults. Simply put, the
is deny service for periods of
time. Companies victimized by
these attacks can range from
major banks to retailers to
information providers such as
International Movie Database
(IMDB). Imagine, for example,
the cost to HSBC when it was
unable to serve its customers
due to massive DDoS attacks
that resulted in multiple outages
a few months ago. The attacks
were not long lived, but the cost
in lost revenue could have easily
SECURITY
reached millions of dollars per
attack—this is to say nothing
of the reputational loss and
depreciation of brand equity.”
OPERATION ABABIL
One of the more infamous
DDoS attacks was code named
Operation Ababil. It was a
multi-year, DDoS campaign by a
hacker group against American
financial institutions. Some
sources in Congress say the
attacks may have been state-
sponsored by Iran.
According to Nick Karram
of Silver Sigma Group, a
cyber security consulting
firm, “Several phases of this
attack caused banks financial
loss due to their customers’
inability to perform transactions.
As a result, institutions have
since invested heavily in traffic
optimization, DDoS prevention,
and other cyber-security tools
that help fortify against future
attacks.”
DDoS attacks are as ubiquitous
as they are relentless. Pejman,
whose company continually
monitors DDoS and other
attacks, says. “We receive alerts
by the minute, notifying us of
break-in attempts across our
network. Most of the hackers
are trying to compromise our
edge devices in order to take
them over for illegal purposes
or to steal data. To thwart their
efforts, we deploy lures called
honey pots throughout the
world. They attract hackers like
bears to honey, and allows us to
monitor their attack behavior.
The most typical attacks start
off as Internet-wide network
subnet scans looking for any
response from a device that is
on the Internet. As the attacks
come in, we capture their IP
addresses, attack patterns and
country of origin so that we can
take measures to block them
from our network.”
STRATEGIES TO COMBAT
DDOS
Some of the strategies to
thwart DDoS hackers amount
to common sense and continual
vigilance. If anyone tries to log
into a device unsuccessfully
numerous times, it needs to be
deemed a hacker and their IP
address has to be put on a black
list. Until it is cleared, it won’t
be allowed through the firewall.
“Blacklist jail, so to speak, can
last from a half hour or so to
indefinitely depending on the
profile of the intruder,” Pejman
says.
The average attack on a small
or medium size business can
range from one to 10 gigabytes
with 20 gigabytes being among
the largest of such attacks. Big
attacks have been about 70
Gigs and, on the high end of
the scale, large corporations
have experienced record
breaking attacks of well over
100 Gigs this year. Industry
observers believe the larger
attacks are state sponsored.
To thwart these current DDoS
onslaught, FCM360 increased all
of its upstream ISP bandwidth to
repel attacks of up to 20 Gigabits
per second internally. “As an
additional layer of protection
for its customers, FCM360 is
also contracting with industry
security providers to increase its
DDoS prevention capability to
over 300 Gigabits per second
in New York and London. This
means the company will be
able to withstand and mitigate
nearly all current DDoS threats
targeting the financial services
and e-commerce industry,” says
Pejman
Silver Sigma Group’s, Karram,
points out: “DDoS and its more
menacing sibling DrDoS, which
stands for Distributed Reflection
Denial of Service attack are
notoriously difficult to deal
with,” adding, “As a result,
we deploy a wide range of
mitigation services that include
smart monitoring systems that
help defend against attackers
while adjusting distribution of
traffic in real-time,”
Nick Karram
hacker initiates a DDoS attack
by overwhelming the target’s
system—sending so much
data so quickly that customers
can no longer gain access to
services. According to Jubin
Pejman, Managing Director of
FCM360 (www.fcm360.com),
a managed services provider
focusing on ecommerce and
managed cloud hosting services:
“Hackers do not have to destroy
the victim’s servers and Internet
operations. All they have to do
Dick Pirozzolo
150 | april 2016 e-FOREX
DDoS attacks in FX
APPLYING BEST PRACTICES
While there is no perfect
defense to DDoS attacks,
financial services organizations
need to apply best practices
such as using the right software
and routinely evaluating load
and security systems. Solutions
must efficiently protect against
attacks, enable continued access
of the site during any DDoS,
and run regular hardening tests
on the system.
DDoS protection, while
crtitically important, can be
costly. According to Pejman,
“Typically a broker or bank
would need a multi-talent
approach for increasing security
including skilled network
security engineers who are
paid upwards of $150,000 per
year, approximately $500,000
of network equipment per
site including 10Gbit+ routers,
unified threat management
devices(UTM) and multiple
10Gbit+ Internet connections
from various ISPs which will cost
upwards of $10,000 per month
on yearly contracts in order to
defend against attacks.”
Pejman adds, “A more cost-
effective solution is to outsource
the staff and hardware to a
professional cyber security
firm that offers all the services
needed to protect ones
network. Monthly subscriptions
to enterprise solutions involve a
financial commitment typically
starting at $10,000 a month on
annual contracts depending on
the amount of clean inbound
traffic needed for the business.”
Some have flippantly suggested
thwarting DDos attackers
by building a larger pipeline
that cannot be overwhelmed.
“But this is impractical and
costly. Rather than increasing
the pipeline, it is far better
to identify attack signatures
and patterns so that you
can separate the normal
from abnormal. Then deploy
specialized boxes that stop the
abnormal traffic,” according to
Pejman.
Another strategy hackers
april 2016 e-FOREX | 151
SECURITY
employ to compromise systems
is called password grinding
where the hacker uses software
scripts to repeatedly guess at
user names and passwords in
a systematic fashion. Pejman
explained that this attack
signature cannot only breach
ones system, it can render many
servers and network devices
useless by exploiting the system
resources to overwhelm them
and prevent you from accessing
the devices when you need to
manage or use them.
COMPUTER HYGIENE
Steps one can take to thwart
DDoS attacks often fall in the
category of computer hygiene:
• Limiting the number
of times someone can
attempt to log on with the
wrong password before
they are placed on a
blacklist—blacklist jail so
to speak
• If one’s company does
not do business in certain
foreign countries, do not
allow access by computers
with IP addresses from
those geographies. For
example, credit card
companies have been
geographically blocking
access for years.
• An institutional investment
firm can simply allow access
by only existing customers
and block all others.
Recent DDoS attacks have been
largely attributed to nation
states, terrorist groups and lone
wolf terrorists who are working
on their own. It has also come
to light that hackers who work
for their government by day,
are often so obsessive that
they often continue to hack at
night for personal gratification.
Futurist Ted Gordon says. “I
worry about the future when a
sophisticated lone-wolf SIMAD
terrorist decides to penetrate
the financial sector.” SIMAD
stands for Single Individual
Massively Destructive.
Gordon, the lead author of
Lone Wolf Terrorism Prospects
and Potential Strategies to
Address that Threat, sees us “in
a race between the destructive
capacity of an individual who
can inflict harm on the level
of, say, putting out all the
lights on the Eastern seaboard,
and the tools of detection
and interdiction that might
be available to thwart such
efforts.”
THREATS FROM NATION
STATES
On the nation-state side of the
threat, China’s behavior has
been particularly worrisome.
The reason for China’s hacking
may be more in the Communist
Party’s DNA and view of the
Internet than anything else,
according to Sharon Hom,
executive director of Human
Rights in China, a Chinese
SECURITY
IP addresses of anyone deemed to be a hacker
need to be put on a black list. Until it is cleared,
it won’t be allowed through the firewall.
“Hackers do not have to destroy the victim’s servers
and Internet operations. All they have to do is deny
service for periods of time.”
Jubin Pejman
Source: Extracted from KPMG research document: Embracing technology for rapid transformation
Cyber Intelligence Process
152 | april 2016 e-FOREX
DDoS attacks in FX
april 2016 e-FOREX | 153
SECURITY
Complicating matters,
though, are privacy-protection
disagreements among some
G7 nations, particularly
between the U.S. and some
of its European allies, about
the surveillance of digital
activities—namely cooperating
with Google, Facebook and
Twitter. These disagreements
can sometimes make joint
action hard to achieve when
technology companies
fear exposing their users’
information to governments—
case in point Apple’s refusal to
provide the US Government
with a backdoor to an iPhone
used in connection with a
terrorist attack.
Similarly Boston Global Forum,
a public policy think tank with
ties to Harvard University, has
developed a framework for
Internet behavior titled Ethics
Code of Conduct for Cyber
Peace and Security, that has
been has been endorsed by
Prime Minister Shinzo Abe of
Japan and Vietnam’s Prime
Minister Nguyen Tan Dung.
It’s a modest initiative, but a
start in combating DDoS and
destructive hacking activities by
nation states.
Anders Corr, PhD of Corr
Analytics in New York, a
cyber security consulting
firm sees promise in greater
involvement by governments,
and international entities
such as NATO, “For example,
NATO held a cyber-security
drill at a cyber-range near its
cyber-security headquarters in
Tallinn, Estonia in November.
Thirty-three countries sent 400
representatives to participate in
the exercise.”
CONCLUSION
In addition to coordinated
action by NATO as well as the
G7 and G20 nations, Dr. Corr
also encourages corporations
to think outside the box when
it comes to lowering the rising
tide of cyber attacks, “Major
technology and increasingly
non-technology companies
with a major interest in
cyber-security, are offering
bug bounties to hackers who
find and report, privately, the
existence of cyber-security
vulnerabilities. United Airlines,
for example, provided a
million free miles to each of
two hackers who provided
information to the company on
its cyber-vulnerabilities in July of
last year.”
Whether on a governmental,
major corporate or small
business scale, “Cyber defenses
are a stopgap. The real solution
is more evolutionary,” says Hom
and will come about, ‘When
governments like China stop
using the Internet as a tool of
social engineering.”
Non-Government Organization.
Hom points out, “While in
the US and most of the world
citizens regard the Internet as
a big open international and
transparent communication
phenomenon, the Communist
Party wants control of society
and information. Though the
path from censorship and
control to hacking the Internet
is not linear, the Party needs to
manage expression online.” In
China, “Cyber security means
security of the Party.”
Adam Segal, director of the
Digital Cyberspace Policy
Program at the Council on
Foreign Relations added, that
the Chinese government
sees the Internet from
the perspective of “cyber
sovereignty and as an entity
that the government can
develop as it sees fit.” Segal,
emphasized that a big part
of China’s incentive to hack
other nation’s computers is to
obtain intellectual property from
foreign companies.
Though China’s theft of 22
million personnel records from
the Federal Office of Personnel
Management is widely known,
private companies have
been closed mouthed about
such intrusions until Google
announced, “We’ve been
hacked along with 30 other
companies,” according to Segal.
Cyber security authority Michael
Sulmeyer, director of the Belfer
Center’s Cyber Security Project
at the Harvard Kennedy School,
blames individual companies
whose security protocols are so
shoddy that it “is like leaving a
bag money on your front lawn
and being stunned to learn that
someone stole it during the
night. At least make it harder.
Make them work.”
While it might be comforting to
think about like-kind retaliation,
it is not always possible.
Segal explained relationships
between the US and China
are complex and come with
competing values, “Fifty percent
of Apple’s revenue comes from
China. One of the world’s
biggest technology companies is
not likely to want heavy-handed
retaliation.” The same can be
said for financial institutions
that have interlocking
relationships worldwide.
INTERNATIONAL NORMS
Is there hope of establishing
international norms that will
discourage DDoS attacks,
especially state-sponsored
attacks? Hom is not optimistic.
She points out, “Whenever the
subject comes up, China, Iran,
Russia, Pakistan and other bad
actors, unite to pose obstacles
in a, “race to the bottom.”
A bright spot though may be
the meeting of the G7 nations,
convening in Japan on May 26-
27. Among the G7’s goals this
time are to come up with norms
of what would be acceptable,
as has been done with chemical
and nuclear weapons.
SECURITY
Sharon Hom
Anders Corr
A DDoS attack is initiated by
overwhelming the target’s system

More Related Content

What's hot

Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Qrator Labs
 
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020 DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020 MazeBolt Technologies
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....Bhairave Maulekhi
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment Victor Oluwajuwon Badejo
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021 Roen Branham
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)Wail Hassan
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? CypSec - Siber Güvenlik Konferansı
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalCheryl Goldberg
 

What's hot (20)

Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
 
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020 DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment
 
Ransomware
RansomwareRansomware
Ransomware
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
W verb68
W verb68W verb68
W verb68
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
 

Similar to Security

The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Brian Metzger
 
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportNominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportYuriy Yuzifovich
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...IRJET Journal
 

Similar to Security (20)

The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportNominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
 

Security

  • 1. DDoS attacks in FX – taking steps to protect your bandwidth and IT resources by Dick Pirozzolo 148 | april 2016 e-FOREX april 2016 e-FOREX | 149 SECURITY Last year’s wave of DDoS attacks on financial institutions that targeted forex brokers and banks in particular, renewed worries over cyber security and whence the next attack will come. These attacks were particularly worrisome for the foreign exchange industry. As of last year, everyone has been on guard — especially trading infrastructure companies, software platform providers, forex brokers and traders who count on reliability and security to conduct their business. DDos or Distributed Denial of Service attacks are crude assaults. Simply put, the is deny service for periods of time. Companies victimized by these attacks can range from major banks to retailers to information providers such as International Movie Database (IMDB). Imagine, for example, the cost to HSBC when it was unable to serve its customers due to massive DDoS attacks that resulted in multiple outages a few months ago. The attacks were not long lived, but the cost in lost revenue could have easily SECURITY reached millions of dollars per attack—this is to say nothing of the reputational loss and depreciation of brand equity.” OPERATION ABABIL One of the more infamous DDoS attacks was code named Operation Ababil. It was a multi-year, DDoS campaign by a hacker group against American financial institutions. Some sources in Congress say the attacks may have been state- sponsored by Iran. According to Nick Karram of Silver Sigma Group, a cyber security consulting firm, “Several phases of this attack caused banks financial loss due to their customers’ inability to perform transactions. As a result, institutions have since invested heavily in traffic optimization, DDoS prevention, and other cyber-security tools that help fortify against future attacks.” DDoS attacks are as ubiquitous as they are relentless. Pejman, whose company continually monitors DDoS and other attacks, says. “We receive alerts by the minute, notifying us of break-in attempts across our network. Most of the hackers are trying to compromise our edge devices in order to take them over for illegal purposes or to steal data. To thwart their efforts, we deploy lures called honey pots throughout the world. They attract hackers like bears to honey, and allows us to monitor their attack behavior. The most typical attacks start off as Internet-wide network subnet scans looking for any response from a device that is on the Internet. As the attacks come in, we capture their IP addresses, attack patterns and country of origin so that we can take measures to block them from our network.” STRATEGIES TO COMBAT DDOS Some of the strategies to thwart DDoS hackers amount to common sense and continual vigilance. If anyone tries to log into a device unsuccessfully numerous times, it needs to be deemed a hacker and their IP address has to be put on a black list. Until it is cleared, it won’t be allowed through the firewall. “Blacklist jail, so to speak, can last from a half hour or so to indefinitely depending on the profile of the intruder,” Pejman says. The average attack on a small or medium size business can range from one to 10 gigabytes with 20 gigabytes being among the largest of such attacks. Big attacks have been about 70 Gigs and, on the high end of the scale, large corporations have experienced record breaking attacks of well over 100 Gigs this year. Industry observers believe the larger attacks are state sponsored. To thwart these current DDoS onslaught, FCM360 increased all of its upstream ISP bandwidth to repel attacks of up to 20 Gigabits per second internally. “As an additional layer of protection for its customers, FCM360 is also contracting with industry security providers to increase its DDoS prevention capability to over 300 Gigabits per second in New York and London. This means the company will be able to withstand and mitigate nearly all current DDoS threats targeting the financial services and e-commerce industry,” says Pejman Silver Sigma Group’s, Karram, points out: “DDoS and its more menacing sibling DrDoS, which stands for Distributed Reflection Denial of Service attack are notoriously difficult to deal with,” adding, “As a result, we deploy a wide range of mitigation services that include smart monitoring systems that help defend against attackers while adjusting distribution of traffic in real-time,” Nick Karram hacker initiates a DDoS attack by overwhelming the target’s system—sending so much data so quickly that customers can no longer gain access to services. According to Jubin Pejman, Managing Director of FCM360 (www.fcm360.com), a managed services provider focusing on ecommerce and managed cloud hosting services: “Hackers do not have to destroy the victim’s servers and Internet operations. All they have to do Dick Pirozzolo
  • 2. 150 | april 2016 e-FOREX DDoS attacks in FX APPLYING BEST PRACTICES While there is no perfect defense to DDoS attacks, financial services organizations need to apply best practices such as using the right software and routinely evaluating load and security systems. Solutions must efficiently protect against attacks, enable continued access of the site during any DDoS, and run regular hardening tests on the system. DDoS protection, while crtitically important, can be costly. According to Pejman, “Typically a broker or bank would need a multi-talent approach for increasing security including skilled network security engineers who are paid upwards of $150,000 per year, approximately $500,000 of network equipment per site including 10Gbit+ routers, unified threat management devices(UTM) and multiple 10Gbit+ Internet connections from various ISPs which will cost upwards of $10,000 per month on yearly contracts in order to defend against attacks.” Pejman adds, “A more cost- effective solution is to outsource the staff and hardware to a professional cyber security firm that offers all the services needed to protect ones network. Monthly subscriptions to enterprise solutions involve a financial commitment typically starting at $10,000 a month on annual contracts depending on the amount of clean inbound traffic needed for the business.” Some have flippantly suggested thwarting DDos attackers by building a larger pipeline that cannot be overwhelmed. “But this is impractical and costly. Rather than increasing the pipeline, it is far better to identify attack signatures and patterns so that you can separate the normal from abnormal. Then deploy specialized boxes that stop the abnormal traffic,” according to Pejman. Another strategy hackers april 2016 e-FOREX | 151 SECURITY employ to compromise systems is called password grinding where the hacker uses software scripts to repeatedly guess at user names and passwords in a systematic fashion. Pejman explained that this attack signature cannot only breach ones system, it can render many servers and network devices useless by exploiting the system resources to overwhelm them and prevent you from accessing the devices when you need to manage or use them. COMPUTER HYGIENE Steps one can take to thwart DDoS attacks often fall in the category of computer hygiene: • Limiting the number of times someone can attempt to log on with the wrong password before they are placed on a blacklist—blacklist jail so to speak • If one’s company does not do business in certain foreign countries, do not allow access by computers with IP addresses from those geographies. For example, credit card companies have been geographically blocking access for years. • An institutional investment firm can simply allow access by only existing customers and block all others. Recent DDoS attacks have been largely attributed to nation states, terrorist groups and lone wolf terrorists who are working on their own. It has also come to light that hackers who work for their government by day, are often so obsessive that they often continue to hack at night for personal gratification. Futurist Ted Gordon says. “I worry about the future when a sophisticated lone-wolf SIMAD terrorist decides to penetrate the financial sector.” SIMAD stands for Single Individual Massively Destructive. Gordon, the lead author of Lone Wolf Terrorism Prospects and Potential Strategies to Address that Threat, sees us “in a race between the destructive capacity of an individual who can inflict harm on the level of, say, putting out all the lights on the Eastern seaboard, and the tools of detection and interdiction that might be available to thwart such efforts.” THREATS FROM NATION STATES On the nation-state side of the threat, China’s behavior has been particularly worrisome. The reason for China’s hacking may be more in the Communist Party’s DNA and view of the Internet than anything else, according to Sharon Hom, executive director of Human Rights in China, a Chinese SECURITY IP addresses of anyone deemed to be a hacker need to be put on a black list. Until it is cleared, it won’t be allowed through the firewall. “Hackers do not have to destroy the victim’s servers and Internet operations. All they have to do is deny service for periods of time.” Jubin Pejman Source: Extracted from KPMG research document: Embracing technology for rapid transformation Cyber Intelligence Process
  • 3. 152 | april 2016 e-FOREX DDoS attacks in FX april 2016 e-FOREX | 153 SECURITY Complicating matters, though, are privacy-protection disagreements among some G7 nations, particularly between the U.S. and some of its European allies, about the surveillance of digital activities—namely cooperating with Google, Facebook and Twitter. These disagreements can sometimes make joint action hard to achieve when technology companies fear exposing their users’ information to governments— case in point Apple’s refusal to provide the US Government with a backdoor to an iPhone used in connection with a terrorist attack. Similarly Boston Global Forum, a public policy think tank with ties to Harvard University, has developed a framework for Internet behavior titled Ethics Code of Conduct for Cyber Peace and Security, that has been has been endorsed by Prime Minister Shinzo Abe of Japan and Vietnam’s Prime Minister Nguyen Tan Dung. It’s a modest initiative, but a start in combating DDoS and destructive hacking activities by nation states. Anders Corr, PhD of Corr Analytics in New York, a cyber security consulting firm sees promise in greater involvement by governments, and international entities such as NATO, “For example, NATO held a cyber-security drill at a cyber-range near its cyber-security headquarters in Tallinn, Estonia in November. Thirty-three countries sent 400 representatives to participate in the exercise.” CONCLUSION In addition to coordinated action by NATO as well as the G7 and G20 nations, Dr. Corr also encourages corporations to think outside the box when it comes to lowering the rising tide of cyber attacks, “Major technology and increasingly non-technology companies with a major interest in cyber-security, are offering bug bounties to hackers who find and report, privately, the existence of cyber-security vulnerabilities. United Airlines, for example, provided a million free miles to each of two hackers who provided information to the company on its cyber-vulnerabilities in July of last year.” Whether on a governmental, major corporate or small business scale, “Cyber defenses are a stopgap. The real solution is more evolutionary,” says Hom and will come about, ‘When governments like China stop using the Internet as a tool of social engineering.” Non-Government Organization. Hom points out, “While in the US and most of the world citizens regard the Internet as a big open international and transparent communication phenomenon, the Communist Party wants control of society and information. Though the path from censorship and control to hacking the Internet is not linear, the Party needs to manage expression online.” In China, “Cyber security means security of the Party.” Adam Segal, director of the Digital Cyberspace Policy Program at the Council on Foreign Relations added, that the Chinese government sees the Internet from the perspective of “cyber sovereignty and as an entity that the government can develop as it sees fit.” Segal, emphasized that a big part of China’s incentive to hack other nation’s computers is to obtain intellectual property from foreign companies. Though China’s theft of 22 million personnel records from the Federal Office of Personnel Management is widely known, private companies have been closed mouthed about such intrusions until Google announced, “We’ve been hacked along with 30 other companies,” according to Segal. Cyber security authority Michael Sulmeyer, director of the Belfer Center’s Cyber Security Project at the Harvard Kennedy School, blames individual companies whose security protocols are so shoddy that it “is like leaving a bag money on your front lawn and being stunned to learn that someone stole it during the night. At least make it harder. Make them work.” While it might be comforting to think about like-kind retaliation, it is not always possible. Segal explained relationships between the US and China are complex and come with competing values, “Fifty percent of Apple’s revenue comes from China. One of the world’s biggest technology companies is not likely to want heavy-handed retaliation.” The same can be said for financial institutions that have interlocking relationships worldwide. INTERNATIONAL NORMS Is there hope of establishing international norms that will discourage DDoS attacks, especially state-sponsored attacks? Hom is not optimistic. She points out, “Whenever the subject comes up, China, Iran, Russia, Pakistan and other bad actors, unite to pose obstacles in a, “race to the bottom.” A bright spot though may be the meeting of the G7 nations, convening in Japan on May 26- 27. Among the G7’s goals this time are to come up with norms of what would be acceptable, as has been done with chemical and nuclear weapons. SECURITY Sharon Hom Anders Corr A DDoS attack is initiated by overwhelming the target’s system