http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=111208 By Jaikumar Vijayan May 05, 2006 Computerworld The CEO of an antispam firm whose service was knocked off-line by a spammer earlier this week claimed that his company was the victim of a sophisticated attack carried out, in part, with the help of someone at a top-tier Internet service provider (ISP). But some security experts expressed doubts abut the company's claims and said they appear to be an attempt to deflect attention from the criticism it has recived for the way in which it handled the attacks. Eran Reshef, CEO of Blue Security Inc., an Israeli antispam firm, said his company was attacked by a major spammer named PharmaMaster who used a combination of methods to knock out the company's Web site and the servers hosting its services. Blue Security, which has its U.S. headquarters in Menlo Park, Calif., operates an antispam service designed to deter junk-mailers by spamming them back. Blue Security's Do Not Intrude program allows individuals to register their e-mail addresses with the company and essentially flood spammers who send them e-mail with automated opt-out requests. The attacks that crippled Blue Service were preceded by PharmaMaster sending out threatening e-mails to subscribers of the Do Not Intrude Registry, warning them of even more spam if they did not withdraw their subscriptions. PharmaMaster then appears to have gotten someone at a major ISP to block Blue Security's IP address on the Internet's backbone routers, most probably via a process called black-holing, Reshef claimed. With black-holing, an ISP essentially removes the advertised path to a particular Web site or IP address -- making it completely inaccessible to the outside world. According to Reshef, PharmaMaster informed Blue Security that he had gotten an ISP to agree to black-hole the company before the attacks started. "Immediately, we started seeing our IP address getting blacklisted by other ISPs," Reshef said. As a result, traffic to the company's main Web site dropped from the usual 100 hits per minute to about two per minute in less than an hour -- and nothing at all from outside of Israel. At almost the same time, massive distributed denial-of-service (DDoS) attacks were launched against the dedicated servers that provide Blue Security's antispam service. The servers, located at five separate hosting provider sites, were bombarded with up to 2GB of traffic per second, rendering them inaccessible. In what Reshef said was a bid to tell subscribers what was happening, Blue Security pointed the company's corporate Web server URL to its blog, which is hosted by Six Apart Ltd. in San Francisco. PharmaMaster then launched a DDoS attack against the server hosting Blue Security's blog. That caused thousands of other blogs hosted by Six Apart to be knocked off-line. The DDoS attacks against the company's dedicated servers meanwhile resulted in service disruptions to five hosting providers as well as major Domain Name System service provider Tucows Inc., he said. Pointing the company's main URL to the Blue Security blog site on Six Apart when it was under attack may not have been the best idea, Reshef said. But at the time, the company had little idea that the attacker would launch a separate DoS attack on the blog site as well. But Todd Underwood, chief operations and security officer at Renesys Inc., a Manchester, N.H.-based Internet monitoring company, said that based on traffic analysis, Blue Security's main Web site appears to have been under a DDoS attack for at least two days before it redirected its URL to the blog. "I do think if you are under attack, it is your duty not to redirect it against someone else," Underwood said. "It is not a fair or an ethical decision," he said, adding that it is hard to imagine that Blue Security didn't know it was being hit with a DDoS attack when it pointed its URL to the blog site. Underwood also said that it was unlikely that a spammer would have been able to get an individual at a major ISP to install a "no route" to Blue Security, as Reshef claimed. "These are not the kind of networks where people can sneak in and make routing configuration changes" without logging that change or discussing it with others, he said. "The suggestion that some Russian spammer could bribe someone to install a no-route" is hard to believe, he said. John Levine, chairman of the Internet Anti-Spam Research Group, said that other antispam efforts have been similarly targeted as well. But they did not involve an ISP. And neither did those who were attacked respond like Blue Security did, he said. "If you know you are under a DoS attack, pointing your DNS at other parties is irresponsible," he said. _________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 29 - August 3 2,500+ international security experts from 40 nations, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Tue May 09 2006 - 00:45:40 PDT