Here’s an article that gives us a blueprint on how an attack might be carried out. Picked this up through Maarten Van Horenbeek’s post about a cyber attack currently underway against Tibet at the Internet Storm Center.

Now if we can just get our users to realize that someone they don’t know really didn’t send them a greeting card!

— Krebs, B. (2008, March 21). Cyber Attacks Target Pro-Tibet Groups.

— Van Horenbeek, M. (2008, March 21). Cyber attacks against Tibetan communities. SANS Internet Storm Center.