Page 2 of 2
"PayPal has permanently restricted the account used by WikiLeaks due to a violation of the PayPal Acceptable Use policy, which states that our payment service cannot be used for any activities that encourage, promote, facilitate or instruct others to engage in illegal activity," PayPal said in a statement posted to its Web site.
The PayPal blog has since been restored, following total of 8 hours and 15 minutes of downtime, in addition to the numerous hours it took resolve a 403 error. The PayPal blog attack was followed by another attack against the main PayPal Web site on Monday.
Minutes after Operation Payback announced the second PayPal attack, hackers cut off access to the Anonymous site with a DDoS attack that shut down the site for hours on Monday.
This time, Operation Payback responded against postfinance.ch, the bank that took down WikiLeaks' founder Assange's defense fund, with another heavy DDoS attack that took down the site for at least 11 hours on Monday. The DDoS attack against PostFinance was complemented with a fax spamming campaign targeting PostFinance's corporate offices.
Sean-Paul Correll, threat researcher at Panda Security who follows the series of denial of service attacks launched by Anonymous' Operation Payback, said that the effort involved hundreds of individuals who coalesced to form a voluntary botnet.
"There are a lot of people involved in the attack. They have a lot of motivation," he said. "This is going against everything they stand for."
Correll contended that the WikiLeaks breach and the subsequent retaliation that sparked an all out war between vigilante hacker groups could set a precedent for public protests in the future.
First of all, it's easy, he said. "They can quickly mobilize, recruit over social networks. They get people into these chat rooms, and literally set them up with these instructions," he said. "It's very easy for people these days to join it. They don’t have to have any technical knowledge at all."
Noa Bar Yossef, senior security strategist for security firm Imperva, said that the Operation Payback attacks differed from others in that they were entirely internally organized and launched instead of stemming from an external hack.
"They are actually asking supporters to download the piece of code, the DDoSing malware itself, that upon wake-up call the computer engages in the DoS," he said. "There is no victimized machine as the participatants knowingly engage in what they call an act of defiance."
Correll said that down the road, denial of service attacks will likely increase as individuals realize their effectiveness in making a statement or getting across a political or religious message.
"It boils down to this, these people feel that they have no voice. They feel that any sort of legal protest really wouldn't do this any justice. They don’t have to stand in a picket line, they can use technology to fight back," he said. "A denial of service attack happens to be the most effective way to block an organization."