Far from being "sophisticated" attacks, LulzSec and Anonymous are run of the mill, say experts. But companies need to look to their defenses. Agricultural technology firm Monsanto became the latest target of hacktivists this week, when hackers donning the mantle of the distributed protest group Anonymous claimed that it had penetrated the firm’s network and leaked personal information on 2,500 of the company’s employees.The same day another group, also calling themselves part of Anonymous, leaked about 90,000 military email addresses allegedly taken from the servers of accounting firm and government contractor Booz Allen Hamilton. On Tuesday, the company acknowledged that some of the information circulating on the Internet was taken from its servers.The attacks are the latest in a spate of cyber unrest that started last year with attacks by the group Anonymous on companies that took a stand against Wikileaks, a group dedicated to outing government secrets. While companies and government agencies had derided the efforts as pranks, the success that hactivists have had in penetrating networks has increasingly caused concern.“In the past, I would say that this is just a bunch of kids — it’s just graffiti,” says James Lewis, senior fellow for cybersecurity at the Center for Strategic and International Studies. “Yet, if we are unable to catch enough of them, then it will become a problem.” Officials from the European Union have expressed concern that the series of attacks could indicate a resurgence of anarchy, a movement that has occasionally caused unrest within Europe and other nations, Lewis says.Yet, companies should also take another lesson to heart: Poor network security is allowing these attacks, Lewis says. While reports on the Internet, including statements from targeted companies, have painted the attacks as sophisticated, the hacktivists are actually using simple techniques, such as scanning for exposed databases and inundating servers with data packets. “For the level of stuff we have seen, people should not be falling victim to it,” Lewis says. “A good defense should have been able to fend it off.”A survey of the tools and techniques used by LulzSec, an offshoot of Anonymous, and various hacktivists claiming be part of Anonymous, supports the assertions that companies are falling prey to easy attacks, says Daniel Clemens, principal security consultant with penetration testing and forensics firm PacketNinjas. Among the hacktivists’ favored tools: The a denial-of-service tool known as the Low Orbit Ion Cannon (LOIC), known vulnerability scanners, and generic Web application scanning tools, such as the Web Application Attack and Audit Framework (WA3F) and an automated SQL injection and database compromise tool known as SQLMap.“I really don’t think that these guys are that sophisticated, across the board,” Clemens says. “I think there are other problems that are symptomatic in the industry among everyone who got popped.”Sony’s security problems — among them, not encrypting passwords — allowed a basic attack to penetrate the network, he says. In addition, the attack on Booz Allen Hamilton also used simple techniques, says Clemens.Yet, occasionally the hacktivists do show some sophisticated techniques. For example, they are increasingly using distributed botnets to help keep them anonymous and to make attacks harder to stop. That they are still at large could indicate that they at least have good operational security, he says.“I think they do need to be taken seriously,” Clemens says. “Whether I think their skill level is high doesn’t matter. They are winning because what they are going after is not well protected.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe