Operation Payback: WikiLeaks Avenged by Hacktivists
WikiLeaks has been experiencing some issues lately ranging from having its Web hosting services shutdown to having its accounts frozen and the flow of money cut off. Some cheer those actions, while others see them as an attack on liberty and free speech and are coming to WikiLeaks' defense.
WikiLeaks is no stranger to controversy. Exposing confidential government documents and communications evokes a passionate response--either for or against the activity. The WikiLeaks site has been the target of DDoS (distributed denial of service) attacks--either by government agencies that don't want sensitive information exposed, or by activist groups that believe WikiLeaks is a threat to international diplomacy and national security.
However, there are also hacktivists--a mashup of hackers and activists--who are willing to cross some lines to defend WikiLeaks as well. The Swiss bank that froze WikiLeaks founder Julian Assange's assets, and PayPal--which cut off the WikiLeaks account used for collecting donations to fund the site--have both been targeted by DDoS attacks of their own.
Noa Bar Yossef, senior security strategist for Imperva, commented via e-mail to say, "Operation Payback's goal is not hacking for profit. In the classical external hacker case we see hackers grab information from wherever they can and monetize on it. In this case though, the hackers' goal is to cripple a service, disrupt services, protest their cause and cause humiliation. In fact, what we see here is a very focused attack - knocking the servers offline due to so-called 'hacker injustice'."
Botnets and DDoS attacks are not new. Botnets are exceedingly common. Typically, PCs of unwitting users are compromised in stealth and sit idly waiting for instructions from the attackers. A botnet can harness thousands, tens of thousands, or possibly hundreds of thousands of compromised PCs at one time to mount massive spam distribution or denial of service attacks.
The WikiLeaks defense is a different story, though. Noa Bar Yossef explains, "In this case however, the Operation Payback is recruiting people from within their own network. They are actually asking supporters to download the piece of code, the DDoSing malware itself, that upon wake-up call the computer engages in the DoS. There is no victimized machine as the participants knowingly engage in what they call an act of defiance."
In other words, rather than simply harnessing the combined power of infected machines without the PC owner's knowledge or consent, the Operation Payback hacktivist botnet is actively seeking volunteers to willingly join the botnet and assist in the effort to make organizations pay for trying to silence WikiLeaks.
WikiLeaks walks a very thin line between paragon of freedom of speech and threat to national security. Even if you have strong opinions one way or the other about Wikileaks, I don't recommend volunteering to compromise your PC in support of any hacktivist efforts. You can't be sure that is all the malware is doing, and you might not be able to control or remove the botnet code once your hacktivism days are over.
- Sponsored Resource:Find your perfect All-in-One printing solution from HP.
Manage remote devices, workers and offices.
Business News Daily
Get the latest technology news that's important to you and your business, fresh seven days a week.
Latest in Business Center Blogs
BizFeed - January 07, 2011 6:00 PM
It's a Mad, Mad 4G World at CES 2011 The term '4G' is on everybody’s lips as device makers and carriers hurry to release devices capable of connecting to the fast new networks.
BizFeed - January 07, 2011 12:54 PM
Motorola Atrix Hints at a Virtualized, Cloud Future Motorola's Atrix is perhaps one of the best phones to come out of CES this year, but it hides an even more impressive feature: Windows virtualization.
Linux Line - January 07, 2011 11:33 AM
Ubuntu Adds Sparkle to Nufront Laptops at CES A Chinese company’s 10 and 14-inch machines are powered by a dual-core ARM Cortex-A9 processor.
BizFeed - January 07, 2011 11:15 AM
Hands On With RIM’s PlayBook Balanced weight and easy navigation make this device stand out, but it’s clearly made for the BlackBerry universe.
BizFeed - January 07, 2011 11:09 AM
CES Gets Serious With Tablets, 4G, NAS, and Pocket Projectors Road warriors are about to get a powerful tech makeover as CES 2011 brings mobility advances on every front.
Security Alert - January 07, 2011 10:26 AM
Text Message of 'Death' Threatens Phone Security Security researchers have shown that many popular phones can be knocked offline by carefully crafted text messages, which could lead to a new type of denial-of-service attack.
- Lenovo ThinkPad W701ds
- HP EliteBook 8440w
- Lenovo ThinkPad X100e
- HP ProBook 5310m
- Lenovo ThinkPad SL510 (2847-22U)
Top 10 Concerns of Buying a VoIP Business Phone System
Buying a Phone System? Compare the 94 Business Phone Systems in One Chart