Banks are likely to be better protected against this wave of attacks, Arbor Networks researchers say Some of the distributed denial-of-service (DDoS) attacks that targeted the websites of U.S. financial institutions this week have peaked at 60 Gbps, according to researchers from DDoS mitigation provider Arbor Networks. A group calling itself “Izz ad-Din al-Qassam Cyber Fighters” launched a series of DDoS attacks against the websites of several U.S. banks during September and October, severely disrupting online and mobile banking services for extended periods of time. The group claimed that the attacks were in response to a controversial film trailer mocking the prophet Muhammad not being removed from YouTube.On Dec. 10, the same group announced that a new wave of attacks would start this week and target U.S. Bancorp, JPMorgan Chase, Bank of America, PNC Financial Services Group and SunTrust Banks. In a post on Pastebin, the group said this second phase of the operation would involve more widespread attacks.The attacks started on Tuesday and continued Wednesday and Thursday. “PNC and other banks have experienced an unusual volume of internet traffic,” PNC Bank said Wednesday in a post on its Facebook page. “As a result, some customers may experience slowness or difficulty when logging into online and mobile banking.” On Thursday, the bank posted an update saying: “PNC is experiencing an unusual volume of internet traffic consistent with recent threats against U.S. banks. Access to pnc.com, online and mobile banking is slow as we work to resolve the issue.”“Some of this week’s attacks have been as large as 60 Gbps,” researchers from Arbor Networks said Tuesday in a blog post. The average rate for attacks in September was 1.67 Gbps, with a peak for that month of 63.3 Gbps, according to figures from Arbor. That said, the attacks are not that much different from the ones in September and October, according to Dan Holden, head of Arbor’s security engineering and response team. There are some changes in the tools being used, but they are not significant, he said.The attackers are using a new version of a tool called Brobot — one of the primary tools used in the first set of the attacks — and the main addition seems to be a new attack method that uses specially crafted DNS packets. However, this is a known technique and from an Arbor standpoint, there should be no problem defending against it, Holden said.He believes that in general the banks and their providers are better prepared to defend against DDoS attacks now than they were two months ago. Even if some of the websites are affected, it will be less so than it was in September and October, he said. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe