Iran Responsible for Wave of Data Center-Originated Attacks on U.S. Banks, Government Says

By

If this decade has a “theme” when it comes to technology, it just might be the rise of the modern data center. While enterprises marvel at the power of data centers to make using business applications easier, and the rest of us take advantage of cloud services to store our data, it’s important to remember that the elements that make these centralized repositories of computing power so appealing can also have ominous implications when misused.

Traditionally, hackers have made use of individual computers, or a networked string of individual computers, to do their dirty work. Increasingly, however, more sophisticated hackers are turning to data centers to harness the very power we admire so much.


Image via Shutterstock

Recent attacks on U.S. banks by hackers are breathtaking in their intensity, surpassing all previous scope and damage. Since September of last year, Bank of America, Citigroup, Wells Fargo, U.S. Bancorp, PNC, Capital One, Fifth Third Bank, BB&T and HSBC have all experienced similar attacks.

According to the New York Times, security researchers say that instead of exploiting individual computers, the attackers engineered entire networks of computers in data centers. The sophisticated and coordination of the attacks have led U.S. government officials to believe that it’s not simply a few malicious attackers seeing what they could accomplish: instead, security agencies are blaming Iran, and believe the attacks are retaliation for U.S. sanctions on the nation.

“There is no doubt within the U.S. government that Iran is behind these attacks,” said James A. Lewis, a former official in the State and Commerce Departments and a computer security expert at the Center for Strategic and International Studies in Washington.

Analysts have not offered any direct proof of these assertions, but say that a clue is in the intent of the attacks: they were not orchestrated to steal money or customer data, but instead to simply wreak havoc.

The dedicated denial of service (DDoS) attacks have originated from data centers all around the world. The various cloud services and public Web hosting services involved have all been infected with a complex kind of malware that is able to elude current security protocols.  

The attacks are similar in nature to attacks waged on the nation of Estonia and its banks and media outlets in 2007. Though it was never proven (or if it was, the information was never made public), the attacks were thought to be state-sponsored by the Russian government.  (The trigger event was the Estonians' removal of a Bronze Soldier Soviet war memorial in the Estonian capital of Tallinn.)

While the world in general becomes a more peaceful place (qualified by a reduction in the number of global wars), it’s hard not to wonder if the next battle front won’t involve guns, missiles and armies, but organized cyber-terrorism intended to cripple entire nations and their critical networks.




Edited by Brooke Neuman
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Shabodi Accelerates Adoption of Network-Aware Applications with CAMARA API Enterprise Reference Implementation

By: Special Guest    2/16/2024

Shabodi, an Application Enablement Platform (AEP) provider unleashing advanced network capabilities in LTE, 5G, 6G, and Wi-Fi 6, announced they have l…

Read More

How Much Does Endpoint Protection Cost? Comparing 3 Popular Solutions

By: Contributing Writer    2/2/2024

Endpoint protection, also known as endpoint security, is a cybersecurity approach focused on defending computers, mobile devices, servers, and other e…

Read More

What Is Databricks? Simplifying Your Data Transformation

By: Contributing Writer    2/2/2024

Databricks is an innovative data analytics platform designed to simplify the process of building big data and artificial intelligence (AI) solutions. …

Read More

What Is Blue/Green deployment?

By: Contributing Writer    1/17/2024

Blue/green deployment is a software release management strategy that aims to reduce downtime and risk by running two identical production environments…

Read More

The Threat of Lateral Movement and 5 Ways to Prevent It

By: Contributing Writer    1/17/2024

Lateral movement is a term used in cybersecurity to describe the techniques that cyber attackers use to progressively move through a network in search…

Read More