advertisement
advertisement

Retail DDoS Attacks After Black Friday 50 Times More Powerful Than Last Year’s

Written by Evan Schuman
December 15th, 2010

A few days after Black Friday, at least 11 major retail chains were hit with distributed denial-of-service (DDoS) attacks that were at least 50 times more powerful than the strongest such attacks from last year, according to cloud hosting firm Akamai.

Akamai’s figures were limited to the chains it hosts, so there’s an excellent chance that other retailers were also hit by the group attacks. DDoS attacks by themselves are nothing new, but the extremely sharp increase in the intensity of such attacks is.

Right around this time, Amazon was very publicly hit with a DDoS attack by programmers retaliating against the E-tailer having cut off the hosting for WikiLeaks. But unlike fellow WikiLeaks targeted sites at MasterCard, Visa and PayPal—which all were crashed for brief periods—the extra capacity of Amazon’s servers sustained the attack and didn’t skip an HREF.

Amazon found itself in an awkward position, where it wanted to trumpet its Web victory but couldn’t. And when some Amazon European sites crashed briefly this weekend, Amazon took the unusual step of telling Reuters that it was a service glitch. “The brief interruption to our European retail sites earlier today was due to hardware failure in our European datacenter network and not the result of a DDoS attempt,” Reuters quoted an Amazon spokesperson saying. Amazon traditionally does not explain such outages—especially brief outages on a weekend night, which is exactly when you’re supposed to do maintenance. (“Amazon.co.uk, amazon.de, amazon.fr and amazon.es were all down for more than 30 minutes until around 2145 GMT when they appeared to work normally again,” the Reuters story reported.)

The unsuccessful attack against Amazon was unusual in many respects. First, the attackers announced beforehand their intent to launch a DDoS attack on Amazon, so the E-tailer had about as much notice as possible to prepare for the assault. Second, the cyber attackers actually offered closure by posting a note that Amazon was too well-defended and that they were officially giving up. (Wouldn’t it be nice to see such a note from Al Qaeda?) The group’s surrender note said: “We can not attack Amazon, currently. The previous schedule was to do so, but we don’t have enough forces.”

Speaking of unsuccessful cyber efforts, what’s the logic behind the U.S. government’s attacks on the sites hosting the WikiLeaks documents? Isn’t it obvious that lots of cache copies are going to float around and that it will move from server to server? Why crack down on hosts when it will clearly only make the documents more desired and widespread? Not only is such an effort futile, but it’s also quite counter-productive.

On those attacks shortly after Black Friday, the November 30 assaults sent site traffic “up to 10,000 times their normal daily traffic,” said an Akamai statement. To put that figure into context, Akamai Senior Product Marketing Manager Michael Cucchi said the biggest DDoS attack from last year increased site traffic only 200 times those sites’ averages.

Other than the traffic surges, Cucchi said, the sites quickly saw a radical change in the list of visiting countries. These retailers—which Akamai wouldn’t name—generally had the U.S. representing the most visits, followed by Canada and then various European countries. But on the morning of the attacks, the top visitors were overwhelmingly coming from Thailand, Russia, India, Brazil and Mexico. “It was completely out of whack with their normal profile of visitors,” Cucchi said.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.