Blog Posts Tagged with "LOIC"
The FBI Can Haz Lulz Too...
March 15, 2012 Added by:Kevin McAleavey
Since Sabu's arrest a number of spurious lulz cannon tools have been interspersed in tweets, including the infamous LOIC, others containing added "call home" code, and some virused booty culminating in the latest release of "Anonymous OS" which is wrapped in trojans...
Comments (1)
Anonymous Gets Pwned...
March 06, 2012 Added by:Kevin McAleavey
The almighty "Anonymous" has always been that the group consists of a handful of seriously talented coders and a cast of thousands of morons, and so word that our "friends" at the RBN had scored on a trending thing by linking to malware really didn't surprise me at all...
Comments (0)
Anonymous Faction Hits Banks With DDoS Attacks
February 06, 2012 Added by:Headlines
A faction of the rogue Anonymous movement temporarily disrupted the online presence of several major banks with an onslaught of distributed denial of service (DDoS) attacks. Among the targets of the group identifying itself as Anonymous Brasil were Citibank and HSBC...
Comments (0)
Cyber Defense Weekly: Anonymous Attacks, Dutch Cyber Strategy
January 24, 2012 Added by:Cyber Defense Weekly
Each attacker only has so much time and energy. It's like trying to get a crowd at a stadium to do the wave. As soon as the pitcher winds up on the mound the wave peters out. What should you do if you are the target of an Anonymous DDoS attack? Just wait, they will go away...
Comments (0)
How to Avoid Being Miscast in a SOPA Opera
January 20, 2012 Added by:Kevin McAleavey
LOIC was originally written in C#, but a later variant was created in Javascript which permits it to be deployed from any internet connected device. LOIC and its JS variant are simple toys, but in the hands of enough people they can create a formidable DDOS attack on a site...
Comments (2)
Anonymous Affiliate Arrested for 2010 DDoS Attack
December 14, 2011 Added by:Headlines
"According to the indictment, Poe used a favorite software tool of the Anonymous collective—a Low Orbit Ion Cannon, which is a computer program that is used to send extremely large numbers of “packets” or requests over a network in an attempt to overwhelm a target computer..."
Comments (0)
Anonymous DDoS Attack on NYSE Fails to Materialize
October 11, 2011 Added by:Headlines
Was the attack just a hoax to pique the media? Perhaps another faction striking off on their own? Or was the operation such a complete failure that the Anonymous ringleaders decided they needed to save face by claiming the attack was just a rouse? Probably a little of all of the above...
Comments (6)
Anonymous Splinters over Planned NYSE Attacks
October 04, 2011 Added by:Headlines
While the tough sounding rhetoric may work to inspire some followers of Anonymous to join the attacks, other members of the collective have issued warnings that the attacks will simply result in more arrests, stating "We do not want history to repeat itself, and are sincerely worried..."
Comments (0)
A Look Inside the Anonymous DDoS Attack Code
August 23, 2011 Added by:Headlines
"Many think of DDoS as a computer network such as a bot network of rogue or infected machines which carry out the orders of whoever controls them. In the case of this specific code, Anonymous only needed to control a single system to begin the attack. The rest is carried out by unwitting accomplices..."
Comments (0)
Is Your Website at Risk from LulzSec?
June 23, 2011 Added by:Kevin McAleavey
There is no excuse for your facility to provide the next round of "lulz." Examining your ability to withstand DDoS attacks and checking your SQL backend against exploits, you stand a chance of withstanding the onslaught of raging children should they turn their "cannons" your way...
Comments (10)
Anonymous Launches DDoS Attack on USChamber.com
May 24, 2011 Added by:Headlines
At the time of this article's publication, the U.S. Chamber website was experiencing intermittent downtime. Anonymous now seems to be probing the systems for other vulnerabilities, such as susceptibility to a SQL-based attack...
Comments (0)
Inside The LOIC: Anonymous Is Still Using It?
April 07, 2011 Added by:Infosec Island Admin
A source has sent in some information on the DoS attacks ongoing at Sony, and I have to say I was surprised that the Anon’s are still using the LOIC. There is some interesting information in the data sent, Such as a server called: "staff.anonops.ru vlad.anonops.ru". Really? Staff???
Comments (2)
PS3 Running Linux Serves Up LOIC in Sony DDoS Attack
April 06, 2011 Added by:Headlines
There is more than a touch of irony to the notion that a "jailbroken" PlaySation3 running an unsanctioned Linux operating system, the very impetus for the legal action brought by Sony against Hotz and Egorenkov, would be employed in a DDoS attack against Sony domains...
Comments (1)
RIAA Targeted by Anonymous' Operation Payback
March 28, 2011 Added by:Headlines
The rogue hacktivist movement Anonymous is apparently breaking out the Low Orbit Ion Cannon again for a reprise of the Operation Payback campaign, this time setting their distributed denial of service (DDoS) attack sites on the Recording Industry Association of America (RIAA)...
Comments (0)
Cyberterrorism - As Seen On TV
March 01, 2011 Added by:J. Oquendo
The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...
Comments (1)
Anonymous DDoS Participants Arrested in UK
January 27, 2011 Added by:Headlines
Anonymous DDoS attackers are typically teenagers and young adults who have little or no understanding of the risks and legal repercussions that can stem from participating in the attacks, and most operate under the misconception that they can not be identified by authorities...
Comments (1)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider