Agricultural technology firm Monsanto became the latest target of hacktivists this week, when hackers donning the mantle of the distributed protest group Anonymous claimed that it had penetrated the firm's network and leaked personal information on 2,500 of the company's employees.
The same day another group, also calling themselves part of Anonymous, leaked about 90,000 military email addresses allegedly taken from the servers of accounting firm and government contractor Booz Allen Hamilton. On Tuesday, the company acknowledged that some of the information circulating on the Internet was taken from its servers.
The attacks are the latest in a spate of cyber unrest that started last year with attacks by the group Anonymous on companies that took a stand against Wikileaks, a group dedicated to outing government secrets. While companies and government agencies had derided the efforts as pranks, the success that hactivists have had in penetrating networks has increasingly caused concern.
"In the past, I would say that this is just a bunch of kids -- it's just graffiti," says James Lewis, senior fellow for cybersecurity at the Center for Strategic and International Studies. "Yet, if we are unable to catch enough of them, then it will become a problem."
Officials from the European Union have expressed concern that the series of attacks could indicate a resurgence of anarchy, a movement that has occasionally caused unrest within Europe and other nations, Lewis says.
Yet, companies should also take another lesson to heart: Poor network security is allowing these attacks, Lewis says. While reports on the Internet, including statements from targeted companies, have painted the attacks as sophisticated, the hacktivists are actually using simple techniques, such as scanning for exposed databases and inundating servers with data packets.
"For the level of stuff we have seen, people should not be falling victim to it," Lewis says. "A good defense should have been able to fend it off."
A survey of the tools and techniques used by LulzSec, an offshoot of Anonymous, and various hacktivists claiming be part of Anonymous, supports the assertions that companies are falling prey to easy attacks, says Daniel Clemens, principal security consultant with penetration testing and forensics firm PacketNinjas. Among the hacktivists' favored tools: The a denial-of-service tool known as the Low Orbit Ion Cannon (LOIC), known vulnerability scanners, and generic Web application scanning tools, such as the Web Application Attack and Audit Framework (WA3F) and an automated SQL injection and database compromise tool known as SQLMap.
"I really don't think that these guys are that sophisticated, across the board," Clemens says. "I think there are other problems that are symptomatic in the industry among everyone who got popped."
Sony's security problems -- among them, not encrypting passwords -- allowed a basic attack to penetrate the network, he says. In addition, the attack on Booz Allen Hamilton also used simple techniques, says Clemens.
Yet, occasionally the hacktivists do show some sophisticated techniques. For example, they are increasingly using distributed botnets to help keep them anonymous and to make attacks harder to stop. That they are still at large could indicate that they at least have good operational security, he says.
"I think they do need to be taken seriously," Clemens says. "Whether I think their skill level is high doesn't matter. They are winning because what they are going after is not well protected."
Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.
This story, "Hacktivism moves from pranks to problems" was originally published by CSO.