Illinois Department of Financial and Professional Regulation Division of Banking

PAT QUINN MANUEL FLORES Governor Acting Secretary

Memorandum

To: All Illinois Financial Institutions

From: Manny Flores, Acting Secretary

Subject: Distributed Denial of Service Attacks planned for May 7, 2013

As you are probably aware, cyber thieves and hacktivist groups (hackers that disrupt online services for social causes) are increasingly in the news for their use of distributed denial of service (DDoS) attacks on the banking system.

Recently a group of hacktivists announced on Pastebin (a publicly available website where hacktivists post announcements) that they plan to initiate a campaign of cyber-attacks, named OpUSA, against U.S. financial institutions’ websites beginning today, May 7th. Previous efforts by this group have had limited impact; however, there have been additional Pastebin postings inviting other hacktivists groups to join or support the planned attacks. The FBI has been reaching out to financial institutions directly to inform them of these postings.

I’ve enclosed information about Distributed Denial of Service Attacks and the steps you can take to help minimize the risk of an attack. Please share this information with your institutions Incident Response Team.

Also enclosed you will find the latest FBI Liaison Alert System (FLASH Message) message. FLASH message contains critical technical information collected by the FBI for use by both interagency and private sector partners. This report is intended for liberal distribution throughout the financial sector to provide recipients with actionable intelligence, which will aid in timely victim notification and response. Every FLASH Message has a unique alpha-numeric tag, which can be located at the top of each report. This tag should be referenced in any subsequent reporting that uses intelligence provided in this report. In addition, we have provided information on the OpUSA event provided by the National Cybersecurity and Communications Integration Center (NCCIC)

Please feel free to contact our offices at (217) 785-2900 if we can be of assistance to your institution or if your institution experiences an attack.

320 West Washington Street, Springfield, Illinois 62786 www.facebook.com/ILDFPR www.idfpr.com http://twitter.com/#!/IDFPR

Distributed Denial of Service Attacks on the Rise: What Community Bank CEOs Should Know

Cyber thieves and hacktivist groups (hackers that disrupt online services for social causes) have been increasing their use of distributed denial of service (DDoS) attacks on the banking system. A DDoS attack in its simplest form floods a financial institution’s website with incoming messages that essentially overloads the website, thereby preventing bank customers’ access to online banking services. In some cases, a goal of the DDoS attack is to serve as a distraction to bank personnel to prevent them from immediately identifying a fraudulent transaction occurring during this time.

A DDoS attack is a temporary disruption. As of this date, most DDoS attacks last for several hours. However, some attacks have continued for several days. While customers will have difficulty accessing online banking services during this period, it is important to remember that there are other delivery channels through which they can conduct banking transactions.

Although this could change, currently only a few banks with less than $5 billion in total assets have been the target of DDoS attacks. This bulletin focuses on what CEOs of banks with less than $5 billion in total assets should know about DDoS attacks and what actions they may want to implement.

Recommended Actions: The potential impact of DDoS attacks depends on the importance of online banking services for your bank’s customers. As the importance of online banking increases for your bank, the more attention it will need in the risk management process. While all banks should educate themselves about the latest cyber threats, banks with $1 to $5 billion in total assets in particular need to be evaluating DDoS attacks as a potential business interruption to online banking. The bank’s business impact analysis, within the business continuity plan, needs to be updated with strategies for addressing this risk. Banks larger than $5 billion should already have continuity plans in place for DDoS interruptions.

Confirm Transactions

If your bank becomes the target of a DDoS attack, consider it a diversionary tactic by thieves to mask stealing funds. Protecting the bank’s payment systems will need to be a primary focus for bank staff. Even if the attack is launched by hacktivists, which sometimes announce their attack in advance, unaffiliated cyber thieves might take advantage of the announced disruption to attempt a Corporate Account Takeover fraud through your bank.

If your institution does not already conduct full call-back procedures of all wire and ACH activity (or above some tolerable loss amount), then strongly consider implementing that process during a DDoS attack. If your bank already conducts call backs for transactions over a specific amount, consider lowering that limit during a DDoS attack.

Educate Customers

If your bank has a large number of commercial banking customers that depend on online banking services, consider talking with at least the key customers and lending officers in advance about the difference between DDoS attacks and hacking which actually puts information and funds at risk. Plan alternative methods that can be used for conducting banking activity if a slowdown to your online banking services occurs, as well as various ways your customers can alert the bank should they discover they are the victim of a cyber-theft.

Retail consumer education is also necessary, either before or during an event. Customers may have questions about the safety of their money when they cannot access their account online. Consider having a prepared response for your customer service / call center, which will likely experience an increased volume of calls from customers trying to conduct online banking activity. Also be prepared to increase the number of customer service representatives answering calls, and remind customers of any alternative methods available to them for conducting banking transactions. Whether you disclose that you are the target of a DDoS attack or simply confirm that you are experiencing network disruptions is an individual decision.

Review Network

Mitigating a DDoS attack is a technical process that usually requires the assistance of outside vendors to work with the Internet Service Provider (ISP) that provides the Internet connection to your website. Depending on your network design, DDoS attacks could slow down your internal network and email. Regardless if the bank’s website hosting is outsourced or internal, institutions with greater dependence on a fast internal network should have their technical staff evaluate the network structure with the threat of DDoS attacks in mind and plan alternative measures to mitigate the impact to bank’s customers.

Also refer to ECTF Bulletin 2012-1 related to DDoS attacks.

TLP: GREEN

National Cybersecurity and Communications Integration Center

06 May 2013 OpUSA: Potential Tools

DISCLAIMER: This advisory is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this advisory or otherwise. Further dissemination of this advisory is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.

Executive Summary Multiple groups, and individual hacker handles have claimed their intent to attack U.S. websites as part of OpUSA. As seen in many hacktivist operations (Ops), willing participants have posted free tools to assist other like minded individuals in their attack efforts. Often, more coordinated attacks will name a specific tool, target, day and time for the attack. That has not been the case for OpUSA thus far. Individual hacker groups seem to be conducting attacks independently, each claiming responsibility for individual defacements and data breaches that have supposedly recently taken place. Below you will find some of the tools being posted in conversations about OpUSA and links to US-CERT sites which provide background on the vulnerabilities exploited by these tools as well as mitigation advice for computer network defense actions.

Structured Query Language (SQL) injection The following is a sampling of tools being offered to willing members interested in using SQL attacks during OpUSA.

• Havij: Automates SQL Injection attacks. It allows the attacker to ‘fingerprint’ the database, retrieve Database Management System users and password hashes, dump tables and columns, retrieve specific data from the database, run SQL statements, and access the underlying file system and execute commands on the . • SQL Poison: This exploit scanner tool incorporates automated Google Dorking methods to look for SQL vulnerabilities. Once the vulnerability is discovered, it performs an SQL injection attack.

The following US-CERT advisories offer further information:

• US-CERT SQL Injection: http://www.us-cert.gov/security-publications/sql-injection • US-CERT Securing Your Web Browser: http://www.us-cert.gov/publications/securing-your-web- browser

Distributed Denial of Service (DDoS) DDoS tools are often used by hacktivist so users may voluntary . These are a list of the available DDoS tools via Open Source:

(LOIC): Floods servers with TCP or UDP packets with the intention of disrupting service. • (HOIC): Can attack as many as 256 sites simultaneously and can target subdirectories of the main page using “booster packs” that enable traffic with multiple user-agent strings, referrers, and headers.

TLP: GREEN TLP: GREEN

• HTTP Unbearable Load King (HULK): Also referred to as HULK DDoSser. Generates unique requests for each and every request generated, which bypasses caching engines and impacting the server’s load directly.1 • Slowloris: Attempts to keep multiple open connections to the target web server and keep them open as long as possible. • DDos Notepad: Attackers can create a simple Batchfile DDoS echo script using Notepad. • ByteDOS: Windows desktop DOS application that is a standalone executable file and doesn’t require any special installation on the attacking machine. It is equipped with embedded IP resolver capabilities that allow the tool to resolve IPs from domain names. It also supports SYN Flood and ICMP flood. • Turbinas: Also referred to as VOLKS TURBINAS.EXE, which are associated with Cloaked Malware group designed to evade security detection systems.2 • Syn Flood DOS: Attack in which the actor sends a number of consecutive SYN requests to a target attempting to consume server resources. • Jays Booter: A customized shell booter, which can be instructed to attack a specific IP for a period of time in an attempt to boot the target off of the internet. There are three types of shells: POST, GET, and SLOWORIS. • HTTPFlooder: Program that attempts to flood the HTTP layer through GET and POST requests. • TORSHAMMER: A Slow POST DOS tool written in Python. It can be run through the TOR network, which will anonymize the attacker. It can impact unprotected web-servers running Apache and IIS.3 • R.U.D.Y: Also known as R-U-Dead-Yet. This is an HTTP POST DOS attack that allows the attacker to choose the forms and form fields that they want to use for the POST attack.4 • OWASP HTTP Tool: A Slow POST DOS tool that allows the attacker to generate a customized number of connections, connection rate, timeouts, and even the content length. 5 • DOSer: A customized DOS tool put together in . It is very simple to use and can be used for HTTP floods or UDP floods. • Windows_DNS_Attack_Tool: DNS Amplification tool. It uses open DNS resolvers and source address spoofing to create large denial of service attacks. • Goodbye: Similar to HTTPFlooder and R-U-Dead-Yet DDoS tools.

The following US-CERT advisories offer further information:

• US-CERT Anonymous DDoS Activity: http://www.us-cert.gov/ncas/alerts/TA12-024A • US-CERT Understanding Denial-of-Service-Attacks: http://www.us-cert.gov/ncas/tips/ST04-015 • US-CERT DNS Amplification Attacks: http://www.us-cert.gov/ncas/alerts/TA13-088A

Password Crackers/Stealers Several password crackers and stealers were spotted on related forums. Some of which are found below:

• Backtrack 5: A based penetration testing tool. The most recent edition was synced up with the new release of KaliLinux. This toolkit provides easy-to-use tools such as port scanners, metasploit, Nmap, Browser Exploitation Framework, Hydra, Aircrack-ng, and Ophcrack. Aircrack and Ophcrack are password crackers. • Hash Cracker: Refers to multiple free applications designed to crack MD2, MD5, SHA-1, SHA- 256, SHA384, and SHA-512 using bruteforce techniques or using a rainbow table/dictionary attacks.

2 of 4 TLP: GREEN TLP: GREEN

• CpanelBruteReiluke: Bruteforce password cracking tool designed by a developer known as Reiluke. Reiluke also has made his blind SQL, email brute force, and exploit scanner tools available via open source. • Gmail_Hacker: Labeled as a free Gmail-specific password cracking tool which is advertised as taking less than 2 minutes to retrieve passwords. • Firefox Password Stealer: Provides details on how an attacker can turn their Firefox browser into a password stealer. This is not a tool, but rather direction for end users.6 • ICQ Steal0r: Program seems to be dedicated to stealing passwords of ICQ users. ICQ is an instant messaging application popularized by Mirabilis.

The following US-CERT advisories offer further information:

• US-CERT Password Management: https://www.us- cert.gov/sites/default/files/publications/PasswordMgmt2012.pdf

Proxy Servers/Anonymizers In additional to options like the onion router (TOR), OpUSA members have advertised the following to assist actors in obfuscating their activity.

• CYBERGHOST: A Virtual Private Network (VPN) simulator which sets up a proxy server allowing anonymous activity with 128-bit AES encryption. It also has the most server locations available in the US and a number of countries in Europe. • TunnelBear: This VPN simulator also circumvents Geoblocking, which is geographically blocking internet users from certain web services.7 • SumRando: This VPN simulator allows users to generate random IP addresses, which can obfuscate attribution. • Real Hide IP: Hides the IP address of anyone employing the application. • Hotspot Shield: Hides the IP address of anyone employing the application.

Other Tools Mentioned Hacker groups have mentioned the following tools among several others that don’t fit the above categories.

• Net Tools: This could refer to any number of items, but c|net offers a network toolbox that has network sniffing and scanning tools. • Pack Del Hacker: This is a simplified, online-based file-sharing service. • EmailScraperWizardv06b: This is noted as one of the more successful email scrapers on the internet. It can extract email addresses from websites. • IP Port Scanner: This could refer to multiple tools dedicated to scanning, mapping and discovering open ports. • IP Scanner: These types of tools can scan networks, detect devices, wireless devices, routers, and can find HTTP, HTTPS, and FTP folders. • DHCP_IP_Forcer: This allows an attacker to essentially scan a network and detect IP addresses and MAC addresses on a network. Some DHCP Force components allow the attacker to reconfigure modems.

3 of 4 TLP: GREEN TLP: GREEN

Summary While it is difficult to assess the specific tools that may be used against targeted organizations, this product is intended to provide organizations with an idea of the type of free tools that may be employed against them, so they may better prepare mitigation strategies during OpUSA or similar hacktivist operations. As always, NCCIC reminds users and administrators of the importance of best practices to strengthen the security posture of their organization's systems. Critical Infrastructure Key Resource (CIKR) owners and operators should work toward a resilient network model that assumes such an attack will occur against their enterprise. The goal is to minimize damage, and provide pathways for restoration of critical business functions in the shortest amount of time possible.

Points of Contact

For all inquiries pertaining to this product, please contact the NCCIC Duty Officer at [email protected] or 1(800) 282-0870. NCCIC Watch & Warning and Analysis can be contacted at [email protected].

Can I share this product?

• Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels.

References

1http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC4QFjAA&url=http%3A%2F% 2Fwww.sectorix.com%2F2012%2F05%2F17%2Fhulk-web-server-dos- tool%2F&ei=Fd2HUaH6MYPS9AS734GIDQ&usg=AFQjCNGeKinhk9P1JUToNeltsoS5ZkOhzw&sig2=UDG5gLt bCFl_5khc30iZxQ&bvm=bv.45960087,d.eWU 2 http://www.prevx.com/filenames/X2439093139683158502-X1/VOLKS+TURBINAS.EXE.html 3 http://franx47.wordpress.com/2013/02/04/using-torshammer-as-a-dos-denial-of-service-tool/ 4 http://code.google.com/p/r-u-dead-yet/ 5 https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool 6 http://www.hackersthirst.com/2011/01/turn-firefox-into-password-stealer.html 7 http://www.pcworld.com/article/260236/tunnelbear_vpn_circumvents_geoblocking.html

4 of 4 TLP: GREEN UNCLASSIFIED

FBI FBI FLASH

FBI Liaison Alert System #C-000007-DD (U) The following information was obtained through FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607.

(U) The FBI is providing the following information with high confidence:

SUMMARY

(U) Recent announcements indicate hacktivists are planning to launch a cyber campaign titled “OpUSA” on or about May 7, 2013. Hacktivists intend to use DNS attacks, defacements, redirects, data leaks, Distributed Denial-of-Service (DDoS) attacks, and doxing. The campaign is targeting United States (US) Web sites and servers, with a focus on: financial institutions, including foreign financial institutions; e-commerce; and government Web sites. Based on open source reporting, many of the same groups planning to participate in OpUSA are believed to have participated in a similar recent campaign. The technical details outlined in this alert are based on activities conducted by those groups during that prior campaign.

(U) Significant attack activity may start on May 6 and continue until May 9, 2013. Due to the time difference between the US and the countries in which the participating groups may reside, it is anticipated that most attack activity should occur during late afternoon or early evening Eastern Daylight Time (EDT); however, these groups may operate during late evening or early morning EDT, with the perception that US-based organizations may not have technical personnel available to address attacks during those times.

TECHNICAL DETAILS

(U) The main attack vectors anticipated for OpUSA are DDoS, Structured Query Language injection (SQLi), and cross-site scripting (XSS). DDoS attacks will likely be the main attack vector with an expected peak rate of approximately 30 gigabits per second (Gbps). The attack traffic may be globally attributed, with anticipated network spikes of up to 9 Gbps originating from Indonesian Class C Internet Protocol Address (IPA) space. The observed DDoS attacks are expected to be mainly SYN flood and spoofed UDP attacks. Attackers are expected to rely primarily on simple DDoS tools, such as the Low Orbit Ion Cannon (LOIC), the High Orbit Ion Cannon (HOIC), and ByteDos and may use minor botnets for the attacks. Some actors may utilize vulnerability scanning tools such as Acunetix to scan and identify Web site vulnerabilities.

(U) Traditional DDoS mitigation techniques should be implemented to include, but not limited to, temporarily suspending or rate limiting IPAs or IP blocks with anomalous request activity, limiting the number of sessions from each IPA, and reducing connection timeout wait time. It is also recommended to analyze infrastructure with publically available vulnerability scanning tools and patching with the latest application and security updates.

POINT OF CONTACT

Please contact the FBI with any questions related to this FLASH report at either your local CTF or FBI CYWATCH: Email: [email protected] or Voice: +1-855-292-3937

UNCLASSIFIED//FOUO

UNCLASSIFIED