Steve Gibson recently published a lengthy discussion of his experiences with a prolonged distributed denial-of-service attack against his company’s web site (www.grc.com) by a 13 year-old (yes, you read it correctly) hacker named Wicked (Full story.) Over the course of 17 days his web site was attacked a total of six times as each preventative measure was systematically defeated. Steve was finally able to convince the perpetrator to stop by penetrating several of the hacker’s defenses to locate him and make a personal plea. The account is instructive on several levels: it highlights the vulnerabilities of production routers and servers, the infrastructure that they sit on, and the ease with which “always on” home PCs can be compromised and turned into “zombies” silently awaiting instructions from a master to unleash a flood of packet requests on a particular target.The hacker had amassed a zombie army of 474 PCs that could generate literally billions of false requests against a target. Worse yet, the PCs had been infected with a Trojan called Sub7Server, which captures every keystroke and reports it back to its “Master.” No wonder people are reluctant to give out credit card information over the Internet. The attack also highlights the failure of companies that derive revenue from selling operating systems, routers, and hosting services to take adequate steps to prevent these outbreaks. The largest concentration of theses PCs reside on popular residential high-speed Internet connections, for which their ISPs were surprisingly indifferent about the situation. The same was true for the hosting service provider, although it ultimately had the best defense against the attacks. THE HURWITZ TAKE:Whose problem is this, anyway? In this real-life example, the “zombie” PC ISPs and the customer’s hosting service provider were in the best position to not only defeat the attackers but to prevent the attack from occurring in the first place. However, they were also among the least interested in doing anything about the situation. Many DDOS solutions are now available on the market (Arbor, Asta, Captus, MazuNetworks, to name a few). However, most of these solutions require the hosting provider to install and/or monitor equipment and make changes to their routing tables when the attack is underway (as was the case at GRC). Given the economic woes facing most hosting service providers, it seems unlikely that they are going to want to spend dollars to help solve this problem. The service-level agreements in place proved equally fragile as they seemed to be designed for peacetime and were not able to withstand a massive DDOS attack. Unless you spend several million dollars a month with your hosting service provider, don’t expect quick response. Securing the endpoints becomes critical. As long as there are vulnerable PCs out there the DDOS and perhaps more importantly the data and identity theft problem will persist. Antivirus, personal firewalls, and better policy enforcement by the “always on” ISPs will help. Wave Systems has a unique approach to the Sub7Server threat a secure chip that can provide “provable” security all the way to the keyboard once it gets installed. Moving from intrusion detection/prevention to threat management. The intrusion detection space is quickly expanding into a threat management discipline. Companies like Recourse Technologies are exploring new boundaries in data collection, event correlation, and forensics that are building a more important picture for enterprises caught up in the nearsighted world of false positives. This is another weapon in the war against DDOS.Don Quixote is dead. Don’t expect Microsoft, Cisco, Sun, etc. to redesign their operating systems to prevent these types of attacks from occurring in the future. They will do what suits their own needs first. Don was never that good at getting the windmills to move, anyway. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe