Other targets of the attack included the National Security Agency, Homeland
Security Department, State Department, the Nasdaq stock market and The
Washington Post newspaper, according to an early analysis of the malicious
software used in the attacks.
The cyber assault on the White House site had “absolutely no effect on the
White House’s day-to-day operations,” said spokesman Nick Shapiro.
South Korean intelligence officials believe the attacks were carried out by
North Korea or pro-Pyongyang forces, but many experts in cyber warfare said
it was simply too early to know where the offensive originated.
South Korea’s National Intelligence Service, its principal spy agency, told
South Korean lawmakers Wednesday it believes that North Korea or North
Korean sympathisers in the South were behind the attacks, according to an
aide to one of the lawmakers briefed on the information.
The aide spoke on condition of anonymity, citing the sensitivity of the
information. The intelligence service said it could not immediately confirm
the report, but it said it was cooperating with American authorities.
The attacks will be difficult to trace, said Professor Peter Sommer, an expert
on cyberterrorism at the London School of Economics. “Even if you are right
about the fact of being attacked, initial diagnoses are often wrong,” he
Many of the US government targets appeared to have blunted the sustained
computer assaults successfully. Others, such as the US Treasury Department,
were knocked offline at times.
Two government officials acknowledged that Treasury’s site was brought down,
and said the agency had been working with its internet service provider to
resolve the problem. The officials spoke on condition of anonymity because
they were not authorized to speak on the matter.
As of last night, Shapiro said, “all federal websites were back up and
running.” Shapiro said that the Department of Homeland Security “is aware of
the DDOS attacks on federal and private sector public-facing websites.”
Ed Donovan, a spokesman for the US Secret Service, said that the cyber attacks
slowed down access to the agency’s website, which operates on the same
computer server as Treasury’s site.
Secret Service’s site remained in operation despite the crippling effects of
the cyber offensive, Donovan said.
“Our site was never knocked down, but it was slowed down at points,” Donovan
said. He added that Secret Service’s “operational side” was not affected.
The Associated Press obtained the target list from security experts analysing
the attacks. It was not immediately clear who might have been responsible or
what their motives were.
The cyber attack did not appear, at least at the outset, to target internal or
classified files or systems, but instead aimed at agencies’ public websites,
creating a nuisance both for officials and the web consumers who use them.
The attacks appeared remarkably successful in limiting public access to victim
websites, but internal email systems are typically unaffected in such
Ben Rushlo, director of internet technologies at Keynote Systems, said
problems with the Transportation Department site began on Saturday and
continued until Monday, while the Federal Trade Commission site was down
Sunday and Monday.
Keynote Systems is a mobile and website monitoring company based in San Mateo,
California. The company publishes data detailing outages on websites,
including 40 government sites it watches.
According to Rushlo, the Transportation website was “100 per cent down” for
two days, so that no internet users could get through to it.
The FTC site, meanwhile, started to come back online late Sunday, but even on
Tuesday internet users still were unable to get to the site 70 per cent of
Dale Meyerrose, former chief information officer for the US intelligence
community, said at least one of the federal agency websites became saturated
with as many as a million hits per second per attack – amounting to 4
billion internet hits at once.
He would not identify the agency, but said the website generally is capable of
handling a level of about 25,000 users at one time.
Meyerrose, who is now vice president at Harris, said federal officials are
divided on the whether a botnet was involved, but said the characteristics
of the attack suggest the involvement of between 30,000 to 60,000 computers
that participated in the assault.
While he said officials were investigating the incident, it appeared one
attack occurred on July 4 that some agencies were able to contain, and then
a second round came on July 7.
Meyerrose said that since the attackers would have used surrogate computers,
it is still too early to tell where it originated.
James Lewis, a senior fellow at the Centre for Strategic and International
Studies, says the fact that both the White House and defence Department were
attacked but did not go down points to the need for coordinated government
“It says that they were ready and the other guys weren’t ready,” he said. “We
are disorganised. In the event of an attack some places aren’t going to be
able to defend themselves.”
Attacks on federal computer networks are common, ranging from nuisance hacking
to more serious assaults, sometimes blamed on China. US security officials
also worry about cyber attacks from al-Qaeda or other groups.
Web sites of major South Korean government agencies, including the
presidential Blue House and the defence Ministry, and some banking sites
were paralysed Tuesday.
An initial investigation found that many personal computers were infected with
a virus ordering them to visit major official websites in South Korea and
the US at the same time, Korea Information Security Agency official Shin
View full article here
Author: Ezine Article BoardThis author has published 5773 articles so far.