SunTrust Banks and Capital One Financial have experienced intermittent disruption of their websites this week Self-described Islamic hacktivists have resumed cyberattacks on major U.S. banks, disrupting the online services of at least two of their targets.SunTrust Banks and Capital One Financial experienced intermittent disruption of their websites Wednesday and Tuesday, respectively, during distributed denial of service (DDoS) attacks, representatives from the banks said via email.Capital One said access to online banking and mobile services was slow or impossible for a few hours, with full service restored by early afternoon. SunTrust provided fewer details, but confirmed its site experienced problems.“We have seen increased online traffic today, and experienced intermittent service availability of some of our online functions,” a spokesman said. [Bill Brenner in Salted Hash: Banks face more attacks, and water is wet]The hacktivist group, which calls itself Izz ad-Din al-Qassam Cyber Fighters, said in a Pastebin post that it would launch attacks Tuesday, Wednesday and Thursday against Capital One, SunTrust Banks and Regions Financial, respectively. Regions Financial told Fox Business it was aware of the threat and was preparing its defenses. “We take online security seriously and are taking every measure to protect the company and our customers,” the bank said.During the last two weeks of September, the self-described Islamic group claimed responsibility for DDoS attacks against PNC Bank, Wells Fargo, U.S. Bank, Bank of America and JPMorgan Chase. The group claims it is retaliating against a video trailer denigrating the Prophet Muhammad. The amateurish video discovered on YouTube last month sparked violent protests in the Middle East and other regions.Given the sophistication of the DDoS attacks, experts believe the attackers are a well-organized group with significant resources. The attacks have included flooding bank Web servers with use amounts of junk data, while also targeting web applications the hackers deemed vulnerable. No data has been stolen, say the banks.On Wednesday, Andy Ellis, chief security officer for Akamai Technologies, said Capital One’s site was serving an error page during that attack that indicated an application and database overload on the Web server.Dan Holden, director of research at Arbor Networks, said the attackers were compromising PHP applications on web servers and WordPress sites using the out-of-date TimThumb plugin in order to deploy tools that allowed them to control the attacks from the hijacked servers. (PHP is a general-purpose server-side scripting language and TimThumb is a PHP script used to resize images.)“Attackers connect to the tools directly or through intermediate servers/proxies/scripts and therefore the concept of command and control does not apply in the usual manner,” Holden said in an email. In more typical cyberattacks, criminals set up command and control servers in advance in order to control large networks of hijacked personal computers, called botnets.While the sophistication of the bank attacks indicates the perpetrators are more than a ragtag group of hacktivists, security experts have not been able to pinpoint their location. Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe