'OpUSA' Cyber-Attacks Fail to Gather Momentum During First Day
A few breaches and some Website defacements are the sum total of the first day of Operation USA, which aimed to "wipe you (America) off the cyber map."Hacktivists' threat to wreak digital havoc on U.S. government sites and financial institutions fell well short of the mark on May 7, the first day of the so-called "OpUSA" attack. On April 21, hacktivists calling themselves the N4m3le55 cr3w and affiliating themselves with the Anonymous movement promised in a Pastebin post to attack nine government sites—including those of the White House, Pentagon and the National Security Agency along with more than 120 banking sites on May 7. Yet, the group appeared to hit only a handful of sites, and none from its list of targets, according to network-security firm Radware, which tracked the attack. A separate Pastebin post bragged of hundreds of defaced sites, most located in other countries and likely the victims of a single vulnerability that facilitated a mass defacement. "The attack had a fairly robust target list, but fell short of expectations," Ronen Kenig, director of security solutions at Radware, said in an email interview with eWEEK. "It seems that only smaller scaled sites took the brunt of the attack."
Others theorized that the group just did not get enough participation or commitment from other hackers and activists to make much difference."The small impact could have been attributed to a similar problem during OpIsrael—little manpower for a herculean task," Radware's Kenig said. "More than likely, they weren't able to recruit enough 'boots on the ground' or have a large enough botnet to execute a large-scale cyber-attack."