back to article Back-2-school hacking: Kaspersky blames pesky script kiddies for rash of DDoS cyber hooliganism

Kasperksy researchers have blamed pesky schoolkids for the big September spike in denial-of-service attacks. They found that more than half of DDoS attacks in the third quarter happen in the month of September. Overall attacks were up just over 30 per cent compared to the second quarter and increased by a similar amount …

  1. IceC0ld Silver badge

    Back-2-School hacking

    ah, so kids go back to school and 'try out' this new fangled DDoSing

    colour me surprised

    the more things change, the more things stay the same

    as for the title of the piece, still trying to figure out the Scooby Doo angle, as they would have got away with it, if it wasn't for those pesky skiddies :o)

    1. AndrueC Silver badge
      Joke

      Re: Back-2-School hacking

      Zoinks!

  2. Anonymous Coward
    Anonymous Coward

    DDoS 1977

    In school we would carry out our own DDoS. The Deliberate Disorder of Seats.

    Our science teacher was OCD about all of the tables and chairs lining up.

    We'd arrive early and totally mess up the room.

    Half the class was spent rearranging the room.

    - Sorry Mr U

    1. Anonymous Coward
      Anonymous Coward

      Re: DDoS 1977

      Surely it must be 'Distributed Deliberate Disorder of Seats' since all the kids in class did it? :-)

  3. Anonymous Coward
    Anonymous Coward

    Am I missing something here, or why wouldn't school and college / university admins notice their networks were being used for DDOS?

    1. Just Enough

      Victims, not culprits

      School and college / universities networks were the majority of the targets of the DDOS, not the networks being used for the DDOS.

  4. Anonymous Coward
    Anonymous Coward

    Former elearning admin

    Yup it happens, as does the tap on shoulder of skiddy and explaining how the proxy catches all

    Quite why they would bother with a DDoS other than being newbs i dunno, just have a look at the remote execution or poison zip file attacks all elearning platforms have if you want to do real fun...

    Probably patched now, but moodle had a great recursive bug where it was possible to place a reference to the zip file it was creating with a predictive name and include it in itself, boxes within boxes 5 hours later no resources left on box and progressive degradation of service, even better if the skiddy passes his "hack" around class

    Then again security is single ply bog roll thin layer in most elearning shiteware, often needing to run as root due to hardocoded group memebership expectation and needing full read write access to directories well outside of the user storage space

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019