A group of mostly Middle East and North Africa based criminal hackers launched a cyber-attack campaign Tuesday that tested the cybersecurity of U.S. government agencies, financial institutions and commercial businesses.
Dubbed OpUSA, the effort is the latest in a string of cyber-attacks on crucial U.S. entities aimed at slowing down or blocking these heavily trafficked sites.
"We see this as a widening in the cyber war front and organizations may require new tactics or technical defenses to defend," Carl Herberger, VP of security solutions at Radware Ltd. (Nasdaq: RDWR) told FOX Business Network.
"We anticipate that today's [Tuesday] attacks will be against high impact targets, including government websites, law enforcement organizations, brand-name entities, financial services organizations and critical infrastructure providers," he added.
The Department of Homeland Security and the FBI warned of the attacks weeks ago.
"The attacks will likely result in limited disruptions and mostly consistent of nuisance level attacks against publicly accessible web pages and possible data exploitation," read an unclassified memo from Homeland Security, first obtained by cybersecurity blog KrebsOnSecurity.com.
"Independent of the success of the attacks, the criminal hackers likely will leverage press coverage and social media to propagate an anti-US message," the alert said.
Indeed, the story made its rounds in the media, while cybersecurity personnel were on high alert.
cyber security risk
This "Massive" Cybersecurity Attack Targets Your Money
If you haven't yet been the victim of a cybersecurity attack, you might be soon depending on what bank you use.
Computer security firm McAfee issued a report yesterday (Thursday) alleging a "massive cyberattack" was being planned for next spring.
According to CNNMoney, a gang of criminals headed by a Russian cyber mafia chief known as NSD had developed a powerful "Trojan Horse" program designed to take money out of victims' bank accounts and channel it into their own.
The plan, called "Project Blitzkrieg," was aimed at 30 U.S. financial institutions, including online payment company PayPal, and was based on a malware program that would clone an account holder's computer to make it look like the accounts were being accessed from the owner's home computer, avoiding security questions that would deny the criminals access to the accounts. The idea was to then access thousands of accounts simultaneously to take out small amounts of cash from each one that would total millions of dollars.
Project Blitzkrieg first came to light when notices were posted on hacker Websites looking for hackers to join the group planning the attack. They offered a share of the loot for service.
Once the plan was discovered, it seems to have "gone dark."
It is impossible to know if Project Blitzkrieg has been cancelled or whether it is proceeding under much tighter security but security companies, including McAfee, have been working with banks to bolster their security.
To continue reading, please click here...