Scoop has an Ethical Paywall
Licence needed for work use Learn More

Video | Agriculture | Confidence | Economy | Energy | Employment | Finance | Media | Property | RBNZ | Science | SOEs | Tax | Technology | Telecoms | Tourism | Transport | Search

 

RDOS Attack On The NZX And Other High-profile New Zealand Sites

Over the past week the DDoS attacks on the NZX and other New Zealand

businesses have been the focus of our news stories. Many media organizations

have sought the opinions of “experts”, often from universities, who have provided

lots of speculation but very little information. As cybersecurity specialists

Darkscope is providing information that might help the media and the New

Zealand public better understand this situation.

DDoS (Distributed Denial of Service) attacks fell in volume year on year from 2016

to 2018 by jumped 84% in Q1 2019[1]. The new attacks lasted longer - typically more

than an hour - as they are more complex and include new attack vectors (see

below) which defeat the existing defensive systems typically deployed to reroute

and stop them. These attacks come with a ransom demand before being

deployed, hence RDoS (Ransom Denial of Service) attacks.

In 2019 the attacks targeted financial service organizations, payment,

entertainment and retail sectors around the world, including South America,

Africa, Northern Europe and parts of Asia. They are credited to the Russian cyber

espionage group “Fancy Bear”[2] who demanded a bitcoin ransom prior to the

attack being launched. This is their message:

“We are the Fancy Bear and we have chosen [Victim] as target for our next DDoS

attack. Please perform a google search for ‘Fancy Bear’ to have a look at some of

Advertisement - scroll to continue reading

our previous work.” In the note, the attackers present a deadline after which a

major DDoS attack will occur if no payment is made. The ransom increases daily.

On sending their threat and as proof of their intentions and capabilities, the

attackers initiate a small half-hour attack ranging from 40 to 60 Gbps, on a

specifically chosen IP address belonging to the victim’s network.

One main difference with these attacks is that they are not aimed at the

organization’s homepage, but target areas in the corporate IT infrastructure which are often inadequately protected. These include original IP addresses and internal

servers. Because of this targeting, companies can be defenceless against the

attacks even if they have implemented DDoS protection, as we have seen with

NZX.

The attackers are using at least eight vectors to launch DDoS attacks and amplify

the disruption, including two relatively new ones, Web Service Dynamic Discovery

(WSD) and Apple’s Remote Management Service (ARMS). WSD as a DDOS attack

vector has only been known about since the beginning of 2019. General

awareness of its effect was not understood until Q3 2019 when details emerged

that the attackers had employed this new attack vector into their toolkit. When implemented these two vectors can amplify the intensity of the attack up to 35

times.

Other vectors include Simple Service Discovery Protocol (SSDP), Network Time

Protocol (NTP), Domain Name System (DNS), Lightweight Directory Access

Protocol (CLDAP), SYN and Internet Control Message Protocol (ICMP).

When all eight vectors are deployed together, the attack is very difficult to stop

even with the best defensive systems, as we have seen with the attacks on the

NZX.

It is unclear whether the attacks on the NZX, Stuff and Radio NZ sites are from

Fancy Bear. In fact, it is unlikely as these attacks do not match Fancy Bear’s

typical behaviour. To date, the attacked organisations and the GCSB are silent on whether ransoms have been demanded or paid.

Darkscope’s experience through daily monitoring millions of internet sites and

dark web activity is that these types of attack are often geographically clustered.

We see similar attacks occurring and recurring in one country before moving to

the next. What is clear is that this new form of attack is being targeted at New

Zealand organisations and we should expect this to continue for some time to

come.

[1] Kaspersky Labs report: “DDoS Attacks in Q1 2019” https://securelist.com/ddos-report-q1-2019/90792/

[2] Fancy Bear is also known as APT28 by Mandiant; Pawn Storm, Sofacy Group by Kaspersky; Sednit, Tsar Team by FireEye; and STRONTIUM (by Microsoft is a Russian cyber espionage group.

© Scoop Media

Advertisement - scroll to continue reading
 
 
 
Business Headlines | Sci-Tech Headlines

 
 
 
 
 
 
 
 
 
 
 
 

Join Our Free Newsletter

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.