Lloyd Bank Attack

Improved Essays
Lloyds Bank – DDoS Attack

Lloyd bank in the UK was hit with a 2-day Distributed Denial of Service (DDoS) attack just recently in January. This attack left customers unable to access their online banking and prohibited them from making payments. According to the article, Lloyd Bank was among a pool of banks in the UK that were targeted. Fortunately, the banking information of Lloyd Bank’s clients remained safe as a DDoS attack only brings down a network’s ability to function properly, but it doesn’t usually steal / compromise user data.
The second supplementary article quotes the CEO of ZoneFox, Jamie Graves, who claims that such institutions would benefit greatly form using User Behavior Analytics (UBA) to distinguish botnet clients from
…show more content…
Such attacks could create concern for their overall network security which directly translates to how comfortable people will be in trusting Lloyd bank to manage their money and savings.

Questions:
- Can DDoS attacks be launched in a way that the service is “attacked” by mimicking actual usage and the only difference between regular usage and the attack would be an abnormally high number of clients (“botnets”)? Would this trick UBA?
- Couldn’t banks use a system where a log of previously used IP addresses is linked to accounts which would then limit the users allowed to use the site to clients who have previously used the service (before the start time of the attack)?
- Is there any way to detect DDoS attacks in real time and respond to them immediately to block botnet clients without banning legitimate users from access the website? As in, is there any type of active protection against DDoS attacks?
- Do hackers use DDoS attacks to force institutions to pay? Much like ransomware would? Or do DDoS attacks only aim to shut down services without any direct monetary

Related Documents

  • Improved Essays

    The Citadel botnet is very similar to Zeus botnet. It is designed to steal personal information used in financial transactions and perform DDoS attacks. Alexa benign traffic includes domain name lists which are used to avoid the possibility of representing old botnet behavior when old binaries are used. The dataset from the Centro University, Argentina…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    United Bank Fraud Essay

    • 327 Words
    • 2 Pages

    I file this complaint against United Bank 129 Main Street, Beckley, West Virginia. United Bank facilitated a lengthy fraud-for-profit scheme. Former United Bank Vice President Michael Farris, United Title employees, United Bank’s escrow attorney James Sheatsley, United Bank Vice President Larry Conway, and other United Bank employees took part in the criminal enterprise. In addition, Zaferatos Appraisal, United Bank’s exclusive appraiser, performed inflated appraisals in all properties used in the scheme.…

    • 327 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Union Bank and Trust Company Wire Transfer Risk Assessment Overview Many consumers and businesses conduct electronic bank-to-bank financial transactions through wire transfers. A wire transfer is a process of moving money from one account to another, across financial institutions. While this activity is convenient, it does not come without risk. Union Bank and Trust (the Bank) acts as both an originator and receiver of domestic and international wires.…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Do You Know? EVERY 24 SECONDS A host accesses a malicious website EVERY 1 MINUTE A bot communicates with its command and control center…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The Equifax disaster points to a much bigger problem. -Rhetorical Analysis This is a rhetorical analysis of the article “The Equifax disaster points to a much bigger problem” written by Herbert Lin. Let us start with the writer himself; he is a senior research scholar for cyber policy and security at the Center for International Security and Cooperation (CISAC) and Hank J. Holland fellow in Cyber policy and Security at the Hoover Institution both of which are located at Stanford University.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Meet Brian Thomas Mettenbrink, an unsuspecting 20-year-old computer geek from Nebraska. He looks just like you and me, acts just like you and me, but yet there is a defining difference about him that separates us: he will be serving a year sentencing in a federal prison for his relation to the 2008 DDoS (distributed denial-of-service) attack on the Church of Scientology’s website called Project Chanology. The goal of a DDoS attack is to overwhelm the targeted website with repeated access requests to the point where the website either slows down to a crawl or goes offline. Prior to the cyber-attack, a video from 2004 depicting actor, Tom Cruise, preaching the churches strange and creepy sentiments was leaked online and viewed millions of times.…

    • 1865 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Barclays Scandal

    • 1122 Words
    • 4 Pages

    Question 1: Who is hurt and who benefits from the manipulation of LIBOR? I would say that the banks are because of the shortage of regulation from the government in partnership with the banks, shoppers and economies globally square measure hurt by the LIBOR scandal. Attributable to the speed manipulation, banks in numerous countries borrowed capital from lenders at rates higher or not up to a number of their competitors. The result was passed on to shoppers in those countries United Nations agency hold accounts or potential accounts with those banks. The shoppers were ready or unable to borrow a lot of or less funding from the banks, which might possible are accustomed open businesses, purchases homes and cars.…

    • 1122 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays