Here’s an article that gives us a blueprint on how an attack might be carried out. Picked this up through Maarten Van Horenbeek’s post about a cyber attack currently underway against Tibet at the Internet Storm Center.

Now if we can just get our users to realize that someone they don’t know really didn’t send them a greeting card!

— Krebs, B. (2008, March 21). Cyber Attacks Target Pro-Tibet Groups. Washingtonpost.com. http://www.washingtonpost.com/wp-dyn/content/article/2008/03/21/AR2008032102605.html.

— Van Horenbeek, M. (2008, March 21). Cyber attacks against Tibetan communities. SANS Internet Storm Center. http://isc.sans.org/diary.html?storyid=4177.

Advertisements