31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[USA | XP] 2025<br />

[ITA | WN7] 1438<br />

It was very similar to <strong>the</strong> list that BillOReilly was seeing in his room, except <strong>the</strong>se were computers that were infected with a virus that had<br />

linked <strong>the</strong>m to Civil’s botnet. These were not voluntary participants. None <strong>of</strong> <strong>the</strong> computers in this room belonged to people who wanted to<br />

be part <strong>of</strong> <strong>the</strong> attack. They were, as <strong>the</strong> phrase went, zombie computers.<br />

If one <strong>of</strong> <strong>the</strong> bots suddenly turned <strong>of</strong>f, it was probably because a random person in Nebraska or Berlin had switched <strong>of</strong>f his or her<br />

computer for <strong>the</strong> day, and <strong>the</strong> list would go down by one. Civil thus didn’t like using all fifty thousand <strong>of</strong> his bots at once; instead, he<br />

switched between a few thousand every fifteen minutes to let <strong>the</strong> o<strong>the</strong>r ones “rest.” Once <strong>the</strong> botnet was firing, <strong>the</strong> people behind each<br />

infected computer would notice that <strong>the</strong>ir Internet connection had become sluggish. Thinking <strong>the</strong>re was a router problem, <strong>the</strong>y’d usually start<br />

fiddling with <strong>the</strong>ir connection or switching <strong>of</strong>f all toge<strong>the</strong>r. Constantly refreshing <strong>the</strong> bots ensured <strong>the</strong>ir owners didn’t switch <strong>of</strong>f or, worse,<br />

call <strong>the</strong> IT guys. (Incidentally, some believed that <strong>the</strong> best people to infect with viruses so <strong>the</strong>y could join into botnets were those on /b/—<strong>the</strong>y<br />

left <strong>the</strong>ir computers on all day.)<br />

Civil gave <strong>the</strong> command to fire. It looked something like this:<br />

!fire 30000 SYN 50 296.2.2.8<br />

A SYN was a type <strong>of</strong> packet, and this meant flooding PayPal.com with thirty thousand bots at fifty packets each for thirty seconds. The type<br />

<strong>of</strong> packet was important because simply flooding a server with traffic wasn’t always enough to take it <strong>of</strong>fline. If you think <strong>of</strong> a server like a<br />

call center manned by hundreds <strong>of</strong> people, sending “ping” packets was like calling <strong>the</strong>m all and simply saying “Hello” before hanging up.<br />

But sending “SYN” packets was like calling all <strong>the</strong> workers and staying on <strong>the</strong> line saying nothing, leaving <strong>the</strong> o<strong>the</strong>r end repeatedly saying<br />

“Hello?” The process sent thousands <strong>of</strong> requests, which <strong>the</strong> server could not ignore, <strong>the</strong>n left it hanging.<br />

Within a few seconds <strong>the</strong> PalPal site had gone down completely. It would stay down for a full hour. The thousands <strong>of</strong> Anons in<br />

#OpPayBack cheered at having taken down <strong>the</strong> <strong>world</strong>’s biggest e-payment website. Mainstream news sites, from <strong>the</strong> BBC to <strong>the</strong> New York<br />

Times to <strong>the</strong> Guardian, reported that <strong>the</strong> “global hacking group” Anonymous had brought down PayPal.<br />

Panda Security’s Correll hopped on IRC using <strong>the</strong> nickname muihtil (lithium spelled backward) and sent a message to Switch himself,<br />

asking about <strong>the</strong> size <strong>of</strong> his botnet and clarifying that he was a security researcher. Switch was surprisingly happy to answer that his friend<br />

(presumed to be Civil) had helped in <strong>the</strong> attack by <strong>of</strong>fering thirty thousand bots, while <strong>the</strong>re had been five hundred in <strong>the</strong> LOIC hive, and that<br />

Switch himself had attacked with thirteen hundred bots.<br />

What this confirmed was that around 90 percent <strong>of</strong> all <strong>the</strong> firepower from <strong>the</strong> attack on PayPal.com had come not from Anonymous<br />

volunteers but from zombie computers.<br />

Topiary quietly started thinking about <strong>the</strong> true power <strong>of</strong> <strong>the</strong> hive. When he had joined <strong>the</strong> #command channel two days earlier, he had<br />

thought that <strong>the</strong> Anonymous DDoS attacks were primarily caused by thousands <strong>of</strong> people with LOIC, with backup support from <strong>the</strong><br />

mysterious botnets. Now he realized it was <strong>the</strong> o<strong>the</strong>r way around. When it came to hitting major websites like PayPal.com, <strong>the</strong> real damage<br />

came from one or two large botnets. Thousands <strong>of</strong> LOIC users could have taken down a smaller site like Scientology.org, but not <strong>the</strong> planet’s<br />

biggest e-payment provider. In practice, finding someone willing to sh<strong>are</strong> his botnet was more useful than getting thousands <strong>of</strong> people to fire<br />

LOIC at <strong>the</strong> same time.<br />

Correll’s observations were reported by Computer<strong>world</strong>.com but largely ignored by <strong>the</strong> mainstream media. Someone nicknamed skiz<br />

pasted a link to <strong>the</strong> story in <strong>the</strong> AnonOps main chat room, saying skeptically, “They claim Anonymous used a 30,000 person botnet. :D.”<br />

Most <strong>of</strong> <strong>the</strong>se eager volunteers did not want to believe that botnets had more firepower than <strong>the</strong>ir collective efforts.<br />

The operators in #command did not like to advertise it, ei<strong>the</strong>r. Not only could that information put <strong>of</strong>f o<strong>the</strong>rs from joining, but it could<br />

bring unwanted attention to <strong>the</strong>ir channel, both from o<strong>the</strong>r <strong>hacker</strong>s and from <strong>the</strong> police. But Civil and Switch continued bragging about how<br />

large and powerful <strong>the</strong>ir botnets were. Spurred on by <strong>the</strong> media reports and <strong>the</strong>ir audience in #command, <strong>the</strong>y were eager to show <strong>of</strong>f again.<br />

The operators agreed that since <strong>the</strong>y had <strong>the</strong> power to launch ano<strong>the</strong>r attack, <strong>the</strong>y should. They duly planned a second attack on PayPal for<br />

December 9. Once again <strong>the</strong>y chose <strong>the</strong> morning—eastern standard time—to get <strong>the</strong> attention <strong>of</strong> American Internet users and <strong>the</strong> media.<br />

This time, though, <strong>the</strong>re was less enthusiasm and coordination. Only a day had passed since seventy-eight hundred people had been in <strong>the</strong><br />

main AnonOps chat room, but <strong>the</strong> numbers using LOIC had started tapering <strong>of</strong>f. Then, when it came time to fire on PayPal a second time,<br />

volunteers in <strong>the</strong> chat room, #operationpayback, were told to wait. They were not told why. Topiary was also in #command waiting for <strong>the</strong><br />

attack to happen so he could write his first press release. The problem was that in some unknown part <strong>of</strong> <strong>the</strong> <strong>world</strong> Civil was still sleeping.<br />

“Do we have anything to write about?” asked Topiary. “Because nothing’s happened.”<br />

“No, we have to wait for Civil to come online,” was <strong>the</strong> reply.<br />

An hour later, Civil finally signed into #command and made a few grumpy remarks. As <strong>the</strong> operators told <strong>the</strong> hive to fire <strong>the</strong>ir (largely<br />

ineffective) cannons, Civil turned on his botnet and took down PayPal.com. He <strong>the</strong>n signed <strong>of</strong>f and went to have his breakfast.<br />

As Topiary watched, <strong>the</strong> secret power <strong>of</strong> botnets was reconfirmed. The botnets had boosted <strong>the</strong> first PayPal attack, since <strong>the</strong> hive was so<br />

big, but <strong>the</strong> second time around just one botnet had done all <strong>the</strong> work. The second attack also wouldn’t have happened if Civil had not been<br />

bragging. But <strong>the</strong> operators still wanted Anonymous and <strong>the</strong> media to think that thousands <strong>of</strong> people had been responsible. Ignoring <strong>the</strong>se<br />

uncomfortable truths, Topiary wrote up a press release about <strong>the</strong> “hive” striking back.<br />

After <strong>the</strong> second PayPal attack, <strong>the</strong>re was more bragging from Civil and Switch and <strong>the</strong> AnonOps operators told <strong>the</strong>m <strong>the</strong>y could hit<br />

MasterCard.com on December 12. They broadcast <strong>the</strong> date and time <strong>of</strong> <strong>the</strong> attack across <strong>the</strong> Internet, knowing that, with <strong>the</strong> botnets doing<br />

most <strong>of</strong> <strong>the</strong> work, it would be fun but not crucial to get ano<strong>the</strong>r horde <strong>of</strong> people firing. This time around, only about nine hundred people had<br />

hooked up <strong>the</strong>ir LOICs to <strong>the</strong> AnonOps chat network and fired on MasterCard.com. It didn’t matter. Thanks to Civil and Switch, <strong>the</strong> website<br />

for one <strong>of</strong> <strong>the</strong> <strong>world</strong>’s biggest financial companies went down for twelve hours, and right on schedule.<br />

Over time, a handful <strong>of</strong> o<strong>the</strong>r people with botnets would help AnonOps. One <strong>of</strong> <strong>the</strong>m was a young <strong>hacker</strong> named Ryan. Aged nineteen and<br />

living with his p<strong>are</strong>nts in Essex, England, Ryan’s real name was Ryan Cleary. In <strong>the</strong> <strong>of</strong>fline <strong>world</strong>, Ryan, who would later be diagnosed with<br />

Asperger syndrome, r<strong>are</strong>ly left his room, taking dinner from a plate that his mo<strong>the</strong>r would leave outside his bedroom door. But his dedication

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!