FBI issues Anonymous warrants

The FBI issues 40 search warrants in relation to an investigation into Anonymous DDoS attacks.

hacker

The FBI has issued over 40 search warrants as part of an investigation into Anonymous distributed denial of service attacks.

The US law enforcement body made the announcement yesterday after UK police arrested five males as part of an investigation into Anonymous.

Anonymous made headlines last year after launching a number of DDoS attacks against companies that had stopped serving WikiLeaks.

Advertisement - Article continues below

Security professionals believe those being investigated were using the LOIC (Low Orbit Ion Cannon) tool to carry out DDoS attacks.

"These distributed denial of service attacks (DDoS) are facilitated by software tools designed to damage a computer network's ability to function by flooding it with useless commands and information, thus denying service to legitimate users," an FBI statement read.

"A group calling itself Anonymous' has claimed responsibility for the attacks, saying they conducted them in protest of the companies' and organisations' actions."

The FBI reminded people that facilitating or conducting a DDoS attack is illegal and, as in the UK, anyone found guilty of participating in such attacks could get up to 10 years in prison.

"Suggesting that creating a multi-purpose tool is the reason they are executing these warrants strikes a chill in me," said Chester Wisniewski, senior security advisor at Sophos Canada, in a blog post.

Advertisement
Advertisement - Article continues below

"That would be like going after Stanley Tools for making the box cutters that the 9-11 hijackers used. I hope it is an honest mistake."

Yesterday, Mikko Hypponen, chief research officer at F-Secure, told IT PRO he believed those arrested in the UK had used the LOIC tool in pro- WikiLeaks DDoS strikes.

He said if an internet service provider released IP logs, it would be simple to locate LOIC users.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

26 Mar 2020