CERT mailing list archives

Current Activity - Denial-of-Service Malware Campaign


From: Current Activity <us-cert () us-cert gov>
Date: Tue, 24 Jan 2012 17:59:06 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Denial-of-Service Malware Campaign

Original release date: January 24, 2012 at 5:35 pm
Last revised: January 24, 2012 at 5:35 pm


US-CERT is aware of public reports of ongoing distributed
denial-of-service attacks against entities in the government and
private sector. According to the reports, these attacks are being
attributed to the hacker group Anonymous.
US-CERT encourages users and administrators to do the following to
reduce the risk associated with this and other malware campaigns:
  * Do not open attachments in email messages from unknown sources.
  * Install anti-virus software and keep virus signatures files up to
    date.
  * Refer to the Recognizing and Avoiding Email Scams (pdf) document
    for more information on avoiding email scams.
  * Refer to the Avoiding Social Engineering and Phishing Attacks
    document for information on social engineering attacks.
  * Refer to the Recovering from Viruses, Worms, and Trojan Horses
    document for additional information on how to recover from
    malware.
  * Refer to the Continuing Denial of Service Threats Posed by DNS
    recursion (v2.0) (pdf) document and Understanding
    Denial-of-Service Attacks document for additional information on
    denial-of-service attacks.

US-CERT will provide additional information as it becomes available.

Relevant Url(s):
<http://www.us-cert.gov/cas/tips/ST04-014.html>

<http://www.us-cert.gov/reading_room/DNS-recursion033006.pdf>

<http://www.us-cert.gov/cas/tips/ST05-006.html>

<http://www.us-cert.gov/reading_room/emailscams_0905.pdf>

<http://www.us-cert.gov/cas/tips/ST04-015.html>

====
This entry is available at
http://www.us-cert.gov/current/index.html#anonymous_activities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTx83hz/GkGVXE7GMAQKeOwf/egqLKxOXFFhWQ7RUscTIunAvOWTfPeNf
CwLr+TXC4bfye7+N+zcexML58d0odHOUhuTPSlNNzMQAJz0bMc4qFtRX9wsryEDk
eR5lM5cHcuw6jsBHOADxEJlM537SZAYVtDuEgQMd3Af0hBaKLyN3G2Vw6UrseiIS
IhJMA28QNN3bDvWc5UoKdhLXutP3SCwDDvA2jcGgndnenmfkh0ErK2JG85TDoNm2
DkJpahzK2rSmyhsuzoQ8RV/dewnQc0IlM5itREujVpqsMZDL3ID3CnQt+NKKlE6K
93IOTq8sSPt4d81KeQREho9DbvqZXLJVnOOiHCERa1WOSGfg/BowLQ==
=j5/N
-----END PGP SIGNATURE-----


Current thread: