Imperva’s, the web security specialist, Hacker Intelligence Initiative(HII), has been closely tracking the Anonymous Hacker Group and its attacks against various Web sites, Imperva have found that the tool to initiate a denial of service attack has been downloaded over 40,000 times with the majority of downloads occurring in the US.
Amichai Schulman, chief technology officer at Imperva comments "The tool was originally developed as an open-source network stress-testing tool. It was recently tweaked to include a central command-and-control module. Operation Payback's ability to challenge serious sites and do that simultaneously is very much coupled to the introduction of the new version with its [command-and-control] capabilities. My speculation is that due to the substantial increase in downloads, it is highly likely this is no longer just a social movement, but also a technical movement like a botnet."
Shulman continues “The “voluntary” botnet is illegal. These attackers are downloading code which is performing an attack. Although they did not write the code, and although they are hiding behind the mask of so-called ideology, they are engaging in activity to disrupt a service. Which is illegal. Now with the rate of machines engaging in this activity, we are speculating that the hacktivists are now operating using involuntary botnets – infecting unaware victims to involve them in this campaign. And operating a botnet, is of course, an illegal activity.
According to Imperva, the hacker group is in the process of coordinating botnets with over 100,000 computers capable of generating 800MGBPS traffic to increase the attack horsepower. An attack of that magnitude is likely to better test Amazon's ability to deal with DDoS attacks.
Since yesterday alone the number of downloads for the Operation Payback Denial of Service tool has increased by 5,000