{"id":181115,"date":"2016-09-25T19:16:00","date_gmt":"2016-09-26T00:16:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2016\/09\/25\/krebs-on-security-is-back-online\/"},"modified":"2016-09-25T19:16:00","modified_gmt":"2016-09-26T00:16:00","slug":"krebs-on-security-is-back-online","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2016\/09\/25\/krebs-on-security-is-back-online\/","title":{"rendered":"Krebs on Security is Back Online"},"content":{"rendered":"<p>The security blogger&#8217;s highly regarded site <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/the-democratization-of-censorship\/\">was taken down by a massive DDOS attack, which forced Akamai to drop him from their protection system<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely potent cyber weapons with transnational reach.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">More than 20 years after Gilmore first coined that turn of phrase, his most notable quotable has effectively been inverted \u2014 \u201cCensorship can in fact route around the Internet.\u201d The Internet can\u2019t route around censorship when the censorship is all-pervasive and armed with, for all practical purposes, near-infinite reach and capacity. I call this rather unwelcome and hostile development the \u201cThe Democratization of Censorship.\u201d <\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Allow me to explain how I arrived at this unsettling conclusion. As many of you know, my site was taken offline for the better part of this week. The outage came in the wake of a <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos\/\">historically large distributed denial-of-service<\/a> (DDoS) attack which hurled so much junk traffic at Krebsonsecurity.com that my DDoS protection provider <\/span>Akamai <span style=\"color: blue;\">chose to unmoor my site from its protective harbor.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Let me be clear: I do not fault Akamai for their decision. I was a pro bono customer from the start, and Akamai and its sister company Prolexic have stood by me through countless attacks over the past four years. It just so happened that this last siege was nearly twice the size of the next-largest attack they had ever seen before. Once it became evident that the assault was beginning to cause problems for the company\u2019s paying customers, they explained that the choice to let my site go was a business decision, pure and simple.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Today, I am happy to report that the site is back up \u2014 this time under <a href=\"https:\/\/jigsaw.google.com\/projects\/#project-shield\" target=\"_blank\" rel=\"noopener\">Project Shield<\/a>, a free program run by <b>Google<\/b>  to help protect journalists from online censorship. And make no  mistake, DDoS attacks \u2014 particularly those the size of the assault that  hit my site this week \u2014 are uniquely effective weapons for stomping on  free speech, for reasons I\u2019ll explore in this post.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Why do I speak of DDoS attacks as a form of censorship? Quite simply because the economics of mitigating large-scale DDoS attacks do not bode well for protecting the individual user, to say nothing of independent journalists. <\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">In <a href=\"https:\/\/www.bostonglobe.com\/business\/2016\/09\/23\/cybercrooks-akamai\/qOAhvHoohJcmkxIwg5ChKO\/story.html\">an interview<\/a> with <i>The Boston Globe<\/i>, Akamai executives said the attack \u2014 if sustained \u2014 likely would have cost the company millions of dollars. In the hours and days following my site going offline, I spoke with multiple DDoS mitigation firms. One offered to host KrebsOnSecurity for two weeks at no charge, but after that they said the same kind of protection I had under Akamai would cost between $150,000 and $200,000 per year.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">What exactly was it that generated the record-smashing DDoS of 620 Gbps against my site this week? Was it a space-based weapon of mass disruption built and tested by a rogue nation-state, or an arch villain like SPECTRE from the James Bond series of novels and films? If only the enemy here was that black-and-white.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">No, as I reported in the last blog post before my site was unplugged, the enemy in this case was far less sexy. There is every indication that this attack was launched with the help of a botnet that has enslaved a large number of hacked so-called \u201cInternet of Things,\u201d (IoT) devices \u2014 mainly routers, IP cameras and digital video recorders (DVRs) that are exposed to the Internet and protected with weak or hard-coded passwords. Most of these devices are available for sale on retail store shelves for less than $100, or \u2014 in the case of routers \u2014 are shipped by ISPs to their customers.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Some readers on Twitter have asked why the attackers would have \u201cburned\u201d so many compromised systems with such an overwhelming force against my little site. After all, they reasoned, the attackers showed their hand in this assault, exposing the Internet addresses of a huge number of compromised devices that might otherwise be used for actual money-making cybercriminal activities, such as hosting malware or relaying spam. Surely, network providers would take that list of hacked devices and begin blocking them from launching attacks going forward, the thinking goes.<\/span><\/p><\/blockquote>\n<p>The sheer disproportionality of the attack made one of his Krebs readers notes that this is odd, it&#8217;s like the Death Star being tested out on the Millennium Falcon, rather than Alderran, but Krebs notes that with connectivity providers ignoring a very basic 12 year old protocol, (BCP38) it&#8217;s more like there are an infinite supply of cloned warriors.&nbsp; (Mostly, I prefer not to use <i>Star Wars<\/i> analogies myself.)<\/p>\n<p>My thought is that this was a test.  Krebs on Security was a well protected target, but taking it off line for a few days is not a huge deal in the scheme of things.<\/p>\n<p>I think that it was a dress rehearsal, and so the question is what is going to be the main event.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security blogger&#8217;s highly regarded site was taken down by a massive DDOS attack, which forced Akamai to drop him from their protection system: \u2026\u2026\u2026However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[767,788,897,826],"class_list":["post-181115","post","type-post","status-publish","format-standard","hentry","tag-computer","tag-internet","tag-security","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/181115"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=181115"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/181115\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=181115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=181115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=181115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}