Hackers vow to continue bank attacks
A computer hacking group that has claimed responsibility for cyberattacks on PNC Bank vowed on Tuesday to continue trying to shut down American banking websites for at least the next six months.
As the assault on PNC's website enters its fifth week, the Downtown-based bank appears to have been mostly successful in countering the attacks that try to cut access for online banking customers by overwhelming a website with traffic.
“We continue to see unusual activity, but the vast majority of our customers have no disruption to their service,” PNC spokeswoman Marcey Zwiebel said.
The attacks by a hacking group calling itself Martyr Izz ad-Din al-Qassam Cyber Fighters started Dec. 11 and have been intermittent in recent weeks. However, PNC's response also inadvertently blocked access for some of its legitimate customers, according to an apology the bank emailed to about 5 million customers last week.
In addition to an internal response to the attacks, PNC has informed “the appropriate authorities,” Zwiebel said. She declined to be more specific about the bank's interaction with law enforcement.
A spokesman for The White House, which has started the National Comprehensive Cybersecurity Initiative to combat hacking and other cybercrime, would not comment on the record.
Department of Homeland Security officials declined to answer specific questions about the attacks on PNC and other banks. But in an emailed statement, the department said it is involved in protecting “critical infrastructure and cyberspace against growing and evolving threats.”
“When called upon, the Department of Homeland Security collaborates with public and private sector partners, including the banking industry, to respond to and coordinate mitigation in the case of disruptions to the nation's critical cyber and communications networks and to reduce impacts on critical infrastructure.”
The computer hacking group said in a Tuesday post on an Internet message board it will continue the attacks for 169 days as retribution for an online anti-Islam video that the group has asked be removed from the Internet.
But the message, which includes an equation that purports to calculate the 169-day sentence based on the number of views the video has received, also states the attacks could continue for 56 weeks or 14 months. Read the full message at http://pastebin.com/MHLFTk2G.
“Al-Qassam CF's Jury has voted that USA must pay fines for his evil act based on number of views counted over movie,” the Pastebin.com message said.
“Cyber-attacks of al-Qassam C.F. in recent weeks showed that despite the high cost of U.S. banks to deal with these attacks, the attacks cannot go under control and are unstoppable,” the message states. “Dissatisfaction of customers of the banking services is increasing, but, by contrast, the banks responsibility about the disruptions of their activities is reducing day by day.”
The group has claimed responsibility for two days of denial-of-service attacks that crippled PNC's website in September.
Despite claims that the attacks are retaliation for the video, “Innocence of Muslims,” some Internet security experts have cast doubt on the motive.
The Cyber Fighters group has been launching attacks on U.S. banks since early 2012, well before the release of the video, an expert has told the Tribune-Review.
Denial-of-service attacks are often used in conjunction with attempts by hackers to get inside a bank's computer network, said Mike Saylor, executive director of the Cyber Defense Labs at the University of Texas at Dallas. Saylor could not comment directly on the recent cyberattacks on banks, but Cyber Defense Labs works with federal authorities to research and track hacking groups.
Computer hackers “like to succeed; they like to brag,” Saylor said. A denial-of-service attack could be in response to failing to penetrate a bank's security.
A hacker might respond: “If I can't hack you I'm going to shut you down,” he said.
But the attack could also be part of a more sophisticated assault to breach a website's security, he said. Systems need to be rebooted after an attack, which could leave some parts of the website open to attack.
“A vulnerability may exist during startup,” he said.
PNC officials have said that no customer financial or personal information has been compromised. CEO James Rohr, in an interview on CNBC in October, suggested that denial-of-service attacks could be part of a more sinister plot to steal financial information.
“The stated goal was to disrupt the systems,” Rohr said of the September attacks. “But if you're really kind of paranoid about it, it's to test where the vulnerabilities are so you can come back with another attack.”
Alex Nixon is a staff writer for Trib Total Media. He can be reached at 412-320-7928 or email@example.com.
Add Alex Nixon to your Google+ circles.
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Demand for surveillance systems boosts sales for Vector Security
- Cyber Monday increasingly a ‘blah-iday’ as deals rolled out earlier, longer
- Pennsylvania Game Commission reaps revenue from shale gas under game lands
- Fed slashes its emergency power options in crisis
- Distractions can help keep riders alert in self-driving cars, study finds
- Stocks dip on lower holiday spending fears
- University of Pittsburgh researchers revisit war of electric currents
- IMF adds China’s yuan to basket of top currencies
- Energy Spotlight: Minking Chyu
- As historic breakup nears, Alcoa works to redefine its ‘advantage’
- Older workers try to cut back on hours at job