An updated version of the MyDoom worm is blamed for ongoing denial of service attack against high-profile US and South Korean websites, according to preliminary analysis. Korean anti-virus firm AhnLab reckons that cyberattacks against the US Department of the Treasury and Federal Trade Commission (among others) stem from an …
To get proof
"South Korean intelligence officials have said North Korea or North Korean sympathizers are behind the attacks, though so far they have provided no technical evidence supporting their claims"
To get actual proof would it be so hard to set up a few honeypot machines specifically infected with this new version or weak to attack by it and then analyse the source packets from the people who tell it to attack a target?
Old worm new trick
I wounder how much did the North Korean pay to target DDOS against South Korea and US. I also wounder how many people could they have fed with that money...
MUDdy Waters ...... * .... and Skunks at Work?
"South Korean intelligence officials have said North Korea or North Korean sympathizers are behind the attacks, though so far they have provided no technical evidence supporting their claims."
Oh? ..... "The National Intelligence Service — South Korea's main spy agency — declined to confirm the information. " .... http://www.msnbc.msn.com/id/31789294/ns/technology_and_science-security//
Back to the classroom, boys, for some joined-up thinking training ...... Joint Operations
Reminded me of another story
Reminded me of another story or fantasy we were told first in 2001 and was repeated again in 2002 but this time it allowed for an uncounted multi trillion dollar fraud and double a certain countries national debt and then ultimately crashed Wall Street .
What price the truth or is it a cover story by NSA or "cui bono" ?
Why are the sites still down?
mod_Evasive should be enough to fix this, it's not a new form of denial of service and configurations options exists (and are already built into the webserver) to block it.
Seems to me the webadmin is lax, e.g. www.usfk.mil is still down. It doesn't need an 'emergency cyber response team' to configure a webserver with a feature it already has for a known nuisance!
It seems to me the commercial sites are up and running as normal, but the military sites, like usfk.mil are down. Are they are running around like headless chickens scheduling meetings with cyber response teams and planning strategies and press conferences instead of simply turning on the DDos protection on their webserver?
Get a grip!
"Analysis of the source code"
Fascinating, where'd they get it?
Mnd_evasive will do squat if the volume of crap exceeds the capacity of your pipe
- Put down that Oracle database patch: It could cost $23,000 per CPU
- The END of the FONDLESLAB KINGS? Apple and Samsung have reason to FEAR
- Pics It's Google HQ - the British one: Reg man snaps covert shots INSIDE London offices
- Bose decides today IS F*** With Dre Day: Beats sued in patent spat
- DAYS from end of life as we know it: Boffins tell of solar storm near-miss