Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Do banks have what it takes to withstand DDoS attacks?

DDoS attacks are crude but effective

Article comments

Banks can only cross their fingers and hope the defenses they have in place can withstand cyberattacks like the one that disrupted the online banking site of Wells Fargo & Co., experts say.

On Tuesday, Wells Fargo became the latest victim in a string of attacks on banks that started last week at JP Morgan Chase & Co. and Bank of America Corp. A group calling itself "Mrt. Izz ad-Din al-Qassam Cyber Fighters" claimed responsibility and threatened to hit US Bankcorp and PNC Financial Services Group on Thursday, said a post on Pastebin.

The latest attack took down Wells Fargo's online banking site intermittently. The bank apologised for the downtime on Twitter and appeared to be back up on Wednesday.

Wells Fargo has not provided details of the attack, which appeared in media reports to be a distributed denial of service attack, or DDoS. Dmitri Alperovitch, chief executive of CrowdStrike, a private security firm investigating the attacks, told The Wall Street Journal, "The amount of bandwidth that is flooding the websites is very large, much larger than in other attacks, and in a sense unprecedented."

DDoS attacks are crude but effective. The attackers typically use large networks of compromised computers to overwhelm a website with requests. "I would say few organisations can face a full on botnet DDoS attack and stay operational," said Brent Huston, chief executive of MicroSolved.

The battle often comes down to the amount of bandwidth a banking site has and whether it is large enough to withstand traffic from the botnet and customers. "If the attacker can find away to exhaust the resources of any business critical component of the system, they win," said Jeremiah Grossman, chief technology officer for Whitehat Security.

Beyond increasing bandwidth, banks have other defensive options, such as redirecting traffic to a cloud-based alternative site or using alternate routing tools to move traffic to other locations to balance the load. More expensive options include appliances that do packet analysis to separate good and bad traffic, sending the latter to an unused IP address.

"Those [tools] are well beyond the reach of most small to mid-size organisations," Huston said. "Many banks and credit unions in the small to mid-size range size their bandwidth to basically handle their average web traffic. They try and save money by matching their expenditures to their average use, thus, they get caught in the vice-like squeeze of cost versus risk of a DDoS when these things come along."

Banks the size of Wells Fargo typically have the strongest Internet security. "By and large, most US banks have invested pretty heavily in Internet security," said Andrew Plato, chief executive and president of Anitian Enterprise Security. "It would be hard to imagine that a company with the size and reputation of Wells Fargo having bad Internet security."

The possibility of a site being downed by a DDoS attack is a fact of life on the Internet and users have to be willing to accept it. "That's just the neighborhood, unfortunately," said Dan Olds, an analyst for Gabriel Consulting Group.

To lessen customer anger, banks should send notices when a disruption occurs and how long the site will be inaccessible. "That's great customer service," Olds said.

The group that claimed to be behind the Wells Fargo attack indicated it was in retaliation for the video trailer denigrating the Prophet Muhammad. The amateurish YouTube video made in the US has sparked violent protests in the Middle East and other regions.

Next, read: Iran denies launching DDoS attacks on US banks


Share:

More from Techworld

More relevant IT news

Comments




Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *