LOIC

Low Orbit Ion Cannon

NewEraCracker LOIC GUI
Original author(s) Praetox Technologies
Written in C#
Operating system Windows, Linux, Mac OS X
Platform .NET, Mono
Size 131 KB
Available in English
Type Network testing
License Public domain
Website LOIC at SourceForge; LOIC at GitHub

Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but later it was released into the public domain.[1] LOIC named after a fictional weapon in the Command & Conquer series of video games.[2] The Ion Cannon was first popularized in the original Star Wars movies. Ion Cannons were used for orbital defense against low orbit Star Destroyers on Hoth in The Empire Strikes back.

The software has inspired the creation of an independent JavaScript version, enabling a DoS from a web browser.[3]

Contents

Use

LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[4]

Countermeasures

Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective.[5]

Notable uses

LOIC was utilized by Project Chanology, an offshoot of the Anonymous group, to attack websites from the Church of Scientology, then by Anonymous itself to successfully attack the Recording Industry Association of America's website in October 2010,[6] and again during Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.[7][8] LOIC was utilized by many attackers, despite the fact that a network firewall could easily filter out network traffic it generates, thus rendering it only partly effective.[5]

More than 30,000 downloads of the tool were reported to have occurred between 8 and 10 December 2010.[9] If an attack is not routed through an anonymization network such as Tor, traceable IP address records can be logged by its recipient.[10] This can be used to identify the individual user conducting DDoS attacks from logs kept by their ISPs. On January 27, 2011, five people were arrested in the UK in connection with the Operation Payback attacks,[11] while in June 2011 a further three LOIC users were arrested in Spain for their involvement in the web attacks.[12] On 14 June 2011, it was reported that Turkish police arrested 32 individuals who allegedly attacked government websites in protest against the introduction of state level web filtering. The individuals are thought to be members of Anonymous that used the LOIC tool in their protest.[13]

See also

References

  1. ^ http://praetox.com/n.php/sw/sauce
  2. ^ Paul Mutton (8 December 2010). "MasterCard attacked by voluntary botnet after WikiLeaks decision". Netcraft. http://news.netcraft.com/archives/2010/12/08/mastercard-attacked-by-voluntary-botnet-after-wikileaks-decision.html. Retrieved 12 December 2010. 
  3. ^ Warren, Christina (December 9, 2010). "How Operation Payback Executes Its Attacks". Mashable. http://mashable.com/2010/12/09/how-operation-payback-executes-its-attacks/. 
  4. ^ "Pro-Wikileaks activists abandon Amazon cyber attack". BBC News. 9 December 2010. http://www.bbc.co.uk/news/technology-11957367. 
  5. ^ a b "Anonymous Wikileaks supporters explain web attacks". BBC. 10 December 2010. http://www.bbc.co.uk/news/technology-11971259. Retrieved 11 December 2010. 
  6. ^ Hachman, Mark (October 29, 2010). "'Anonymous' DDoS Attack Takes Down RIAA Site". PC Magazine. http://www.pcmag.com/article2/0,2817,2371784,00.asp. 
  7. ^ Moses, Asher (December 9, 2010). "The Aussie who blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon". The Age (Melbourne). http://www.theage.com.au/technology/security/the-aussie-who-blitzed-visa-mastercard-and-paypal-with-the-low-orbit-ion-cannon-20101209-18qr1.html. 
  8. ^ "Anonymous Wikileaks supporters mull change in tactics". BBC News. December 10, 2010. http://www.bbc.co.uk/news/technology-11968605. 
  9. ^ John E Dunn (10 December 2010). "Wikileaks DDoS tool downloads grow rapidly". Network World. http://www.networkworld.com/news/2010/121010-wikileaks-ddos-tool-downloads-grow.html. Retrieved 11 December 2010. 
  10. ^ Aiko Pras, Anna Sperotto, Giovane C. M. Moura, Idilio Drago, Rafael Barbosa, Ramin Sadre, Ricardo Schmidt and Rick Hofstede (10 December 2010). "Attacks by "Anonymous" WikiLeaks Proponents not Anonymous". CTIT Technical Report 10.41. University of Twente. http://www.simpleweb.org/reports/loic-report.pdf. Retrieved 12 December 2010. 
  11. ^ "Five arrested over 'Anonymous' web attacks". BBC News. 27 January 2011. http://www.bbc.co.uk/news/technology-12299137. Retrieved 30 January 2011. 
  12. ^ Spain arrests Anonymous suspects - BBC News, 10 June 2011. "It seems that LOIC did a poor job of hiding the identity of the people using it. It is believed that some police forces have already moved against the group based on this information. "
  13. ^ BBC News. 14 June 2011. http://www.bbc.co.uk/news/technology-13762626. 

External links