Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms.
Use
LOIC performs a DoS attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.
The software inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.
Countermeasures
Security experts quoted by the BBC indicated that well-written firewall rules can filter out most traffic from DDoS attacks by LOIC, thus preventing the attacks from being fully effective. In at least one instance, filtering out all UDP and ICMP traffic blocked a LOIC attack. Because internet service providers provide less bandwidth to each of their customers in order to provide guaranteed service levels for all of their customers at once, firewall rules of this sort are more likely to be effective when implemented at a point upstream of an application server's internet uplink. In other words, it is easy to cause an ISP to drop traffic destined for a customer by sending a greater amount of traffic than is allowed on that customer's link, and any filtration that occurs on the customer side after the traffic traverses that link will not stop the service provider from dropping excess traffic destined for that customer.
LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used at the attack.
Notable uses
Project Chanology and Operation Payback
LOIC was used by 4chan (A group growing into Anonymous) during Project Chanology to attack websites from the Church of Scientology, once more to (successfully) attack the Recording Industry Association of America's website in October 2010, and it was again used by Anonymous (group) during their Operation Payback in December 2010 to attack the websites of companies and organizations that opposed WikiLeaks.
Operation Megaupload
In retaliation for the shutdown of the file sharing service Megaupload and the arrest of four workers, Anonymous DDoSed the websites of Universal Music Group (the company responsible for the lawsuit against Megaupload), the United States Department of Justice, the United States Copyright Office, the Federal Bureau of Investigation, the MPAA, Warner Music Group and the RIAA, as well as the HADOPI, all on the afternoon of January 19, 2012, through LOIC.
Origin of name
The LOIC application is named after the ion cannon, a fictional weapon from many sci-fi works, video games, and in particular after its namesake from the Command & Conquer series.
See also
- Fork bomb
- High Orbit Ion Cannon
- LAND
- Ping of death
- ReDoS
- Zemra
References
External links
- Original LOIC with professional GUI
- LOIC Special Lowbandwidth Operating Weapon
- An improved version of LOWC forked from GoogleCode
- LOIC IRC-0 IRC controlled version of LOIC-0
- LOIC SLOW Now With IRC and Webpage as C&C
- LOIC project development and downloads at SourceForge
- LOIC project development and downloads at GitHub
- Web version of LOIC at Google Code