After Wednesday’s unprecedented unified online yelp against SOPA and PIPA, Thursday saw a new milestone: the first direct and public activist malware from Anonymous.
A version of Anonymous’ voluntary botnet software, known as LOIC (Low Orbit Ion Canon), was modified to make it not so voluntary, drafting unwary bystanders, journalists and even anons who don’t support DDoS tactics into attacks on the U.S. Justice Department. Thursday’s trickery seems not to have been central to the successful takedown of sites like justice.gov, RIAA.com and MPAA.com, but not all anons are pleased with forcing unwitting bystanders to join in a potentially illegal action.
Several anons speaking to Wired on condition of anonymity voiced dismay that a tactic they consider to be the modern-day equivalent of a sit-in (denial-of-service attacks leave no lasting damage) was ethically corrupted by the new version.
“Preying on unsuspecting users is despicable,” said one anon, speaking to Wired in an online chat. “We need to fight for the user, not potentially land them in jail.”
As part of Thursday’s raging reaction from Anonymous to the Megaupload arrests, people by the thousands voluntarily pointed the LOIC at targets like FBI.gov, DOJ.gov, MPAA.org, BMI.org, RIAA.org and copyright.gov, part of an effort that knocked these sites offline for parts of the day. The tool bombards a targeted site with traffic, in hopes of overwhelming servers so that no one can visit the site.
If enough anons choose to aim the tool at a proposed target, it gives Anonymous an easy route into press coverage without doing any lasting damage to a site. However, the tool doesn’t cover users’ tracks, making it simple for a targeted site to know where the attacks were coming from.
But this new malware variant emerged in the course of the operation, and not everyone that clicked on the link wanted to participate. Unwitting participants included Gawker’s Adrien Chen, who blasted anons for the trick.
In the wake of the SOPA/PIPA protest and the Megaupload arrest, the malware JS LOIC was further modified to autofire at the US Department of Justice and was posted on a Pastehtml site. An obscured, shortened link was posted to Twitter repeatedly, mostly by Spanish language accounts, and an unknown number of people clicked on it. Without their knowledge they began automatically to DDoS the DoJ.
While this tactic was new and unsettling, it’s unlikely this script made much difference in the total level of attack traffic aimed at the DoJ. The JS LOIC is not a powerful tool for overwhelming servers, and the anonymouse.org site never went down, despite being hit every time someone used the malware LOIC on the DOJ or any other target site.
Despite its small footprint and questionable ethics, the existence of the malware version may make it harder for prosecutors to prove in court that someone using the JS LOIC did so intentionally.