The international script-kiddie ensemble known as Anonymous has turned their distributed denial of service (DDoS) attacks on Egyptian government websites.
Analysis from NetCraft shows server failure for Egypt's Ministry of the Interior (MOI) website, and other reports indicate that the Egyptian Ministry of Communications and Information Technology may also have been targeted.
An Anonymous press release board called AnonNews has the following recruitment banner posted that directs participants to the IRC chat room used to coordinate the attack, along with other instructions:
Anonymous had previously targeted the websites of PayPal, Visa, MasterCard, PostFinance Bank and others who had halted business relations with WikiLeaks, spoke out against the group's data releases, or had refused to process donations to the group.
Anonymous has also recently attacked government websites Zimbabwe and Tunisia, as well as making a failed attempt to take down the Bank of America website.
The Tunisian DDoS attacks resulted in a widespread government crackdown against local activists and bloggers.
The downloadable DDoS tool distributed by Anonymous called the Low Orbit Ion Cannon (LOIC) left attack participants vulnerable to identification by authorities.
Developers associated with Anonymous were reported to be working to correct deficiencies in the LOIC code which left participants open to identification by authorities.
A hacktivist known only as The Jester (th3j35t3r) confirmed in mid-January rumors that he had "infected" the latest version of the tool by making alterations to the DHN.zip file circulating on the web.
Alterations to the new version apparently reveal paths, usernames, IP addresses, MAC, and system information that can be used by authorities to identify attackers.
Regardless of the risk of legal repercussions to unwitting participants in the Anonymous DDoS attacks, which are typically teenagers and young adults, active recruitment for the campaigns continues.