SecurityWorldMarket

10/01/2013

Prolexic releases latest suite of threat advisory tools

Hollywood, Fl

Prolexic has released a suite of detection and mitigation rules, a log analysis tool and a comprehensive threat advisory on the Itsoknoproblembro DDoS toolkit.
Considered to pose a very effective, multi-level threat, Itsoknoproblembro has been a favoured weapon in headline-making DDoS (Distributed Denial of Service) attacks against the US banking industry.

“Our security experts have successfully mitigated this threat multiple times, in tense, real-time digital battles,” said Prolexic Chief Executive Officer Scott Hammack. “This toolkit, which was dangerous to begin with, has been evolving rapidly over the past year, and has been increasingly used in coordinated campaigns targeting specific industries. The December attacks against the banking industry represented the fourth documented campaign against finance companies; we’ve also documented smaller campaigns against the energy and hosting provider industries.

“Given the chatter in the hacker underground, we expect these Itsoknoproblembro DDoS campaigns will continue to grow in frequency,” Hammack added. “We want to support the security community by sharing our knowledge, so we can help eradicate this threat and remove these malicious scripts from infected machines before they do even more damage.”

The Prolexic Security Engineering & Response Team (PLXsert) first issued a public warning about Itsoknoproblembro in October. The toolkit was also profiled in Prolexic’s Q3 2012 Attack Report. The recently issued threat advisory profiles 11 different attack signatures and provides detailed SNORT rules for DDoS mitigation. The attack vectors include POST, GET, TCP and UDP floods, with and without proxies, including a so-called Kamikaze GET flood script that can repeatedly relaunch automated attacks.

Additionally, Plxsert published a set of detection rules to identify infected web servers (bRobots), along with a free log analysis tool that can be used to pinpoint which scripts were accessed, by what IP address and for what DDoS targets. Armed with this information, the infected servers can be sanitised, preventing them from being used in subsequent Itsoknoproblembro campaigns.

“The nature of these threats requires the cooperation of everyone in the network protection community to work together,” Hammack added. “Working with our fellow engineers and researchers, we will continue to provide free updates of this log analysis tool and encourage users to share their logs of compromised servers for continued analysis and refinement.”

A complimentary copy of the full DDoS threat advisory, including mitigation rules and detection rules, as well as the log analysis tool, BroLog, are available from the Prolexic web site.

Additional information on the Itsoknoproblembro attacks and other recent DDoS trends will be shared in the Prolexic Q4 2012 Global DDoS Attack Report later this month.


Product Suppliers
Back to top