Government sites survive triple takedown attempt by Anonymous
Home Office claims last weekend's Distributed Denial of Service (DDoS) attacks left systems and services unharmed.
Hacking group Anonymous failed to take several Government websites offline last weekend, despite subjecting them to a sustained Distributed Denial of Service (DDoS) attack.
At the start of the month, Anonymous used social networking site Twitter to announce plans to stage DDoS attacks against Government websites every Saturday night.
The group made good on this pledge last week by targeting the Home Office website, making inaccessible to users for several hours.
The Government line on this is that our services and systems were unharmed across all sites
Over the weekend, Anonymous appeared to have added the Government Communications Headquarters (GCHQ) and Home Secretary Theresa May's website to its hit list.
According to a flurry of tweets sent out by the Anonymous Operations twitter account on Saturday night, all three targets were taken down, at least intermittently.
The group also called on followers to verify the status of the sites from their locations across the globe, with one claiming GCHQ had tried to evade attack by switching its site to a different IP address.
However, Rik Ferguson, director of security research and communications for EMEA at Trend Micro, said switching IP addresses would be insufficient protection against "even the most simplistic of DDoS."
"DDoS is defeated by bandwidth. You need to have more than your attacker and this can be accomplished in a number of ways," he told IT Pro.
"You can buy bigger pipes and build bigger server farms locally, you can block incoming requests based on geography [or you can] use the power of the cloud...like Google, Amazon, IBM or Rackspace [to] hide behind someone else's bandwidth."
In This Article
Become a digital service provider
How to transform your business from network core to edgeDownload now
Optimal business results with the cloud
Evaluating the best approaches to hybrid cloud adoptionDownload now
Virtualisation that enables choices, not compromises
Harness the virtualisation technology that's right for your hybrid infrastructureDownload now
Email security threat report 2020
Four key trends from spear fishing to credentials theftDownload now