Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack
Why many attack techniques can be reused – but organizations can’t defend against them. Continue reading Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack
Collaborate Disseminate
Why many attack techniques can be reused – but organizations can’t defend against them. Continue reading Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack
More than 250 customers of a popular and powerful online attack-for-hire service that was dismantled by authorities in 2018 are expected to face legal action for the damage they caused, according to Europol, the European Union’s law enforcement agency…. Continue reading 250 Webstresser Users to Face Legal Action
The FBI has taken down several of the largest DDoS-as-a-service sites on the web. Continue reading FBI Denies Service to 15 DDoS-for-Hire Sites, Charges Operators
The FBI just saved the Christmas.
The U.S. Justice Department announced earlier today that the FBI has seized domains of 15 “DDoS-for-hire” websites and charged three individuals running some of these services.
DDoS-for-hire, or “Booter” or “Stresser… Continue reading FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged
Authorities in the U.S., U.K. and the Netherlands on Tuesday took down popular online attack-for-hire service WebStresser.org and arrested its alleged administrators. Investigators say that prior to the takedown, the service had more than 136,000 registered users and was responsible for launching somewhere between four and six million attacks over the past three years. Continue reading DDoS-for-Hire Service Webstresser Dismantled
Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks around the world, has served up its last internet-paralyzing traffic tsunami. Continue reading Europol Smacks Down World’s Largest DDoS-for-Hire Market
Last week we looked at reports from China and Israel about a new “Internet of Things” malware strain called “Reaper” that researchers said infected more than a million organizations by targeting newfound security weaknesses in countless Internet routers, security cameras and digital video recorders (DVRs). Now some botnet experts are calling on people to stop the “Reaper Madness,” saying the actual number of IoT devices infected with Reaper right now is much smaller.
Arbor Networks said it believes the current actual size of the Reaper botnet fluctuates between 10,000 and 20,000 bots total. Arbor notes that this can change any time. Continue reading Fear the Reaper, or Reaper Madness?
LOIC Download below – Low Orbit Ion Cannon is an Open Source Stress Testing and Denial of Service (DoS or DDoS) attack application written in C#.
It’s an interesting tool in that it’s often used in what are usually classified as political cyber-terrorist attacks against large capitalistic organisations. The hivemind version gives average non-technical users a way to give their bandwidth as a way of supporting a cause they agree with.
Read the rest of LOIC Download – Low Orbit Ion Cannon DDoS Booter now! Only available at Darknet.
Continue reading LOIC Download – Low Orbit Ion Cannon DDoS Booter
Two young Israeli men alleged by this author to have co-founded vDOS — until recently the largest and most profitable cyber attack-for-hire service online — were arrested and formally indicted this week in Israel on conspiracy and hacking charges. Continue reading Alleged vDOS Operators Arrested, Charged
A new report proves the value of following the money in the fight against dodgy cybercrime services known as “booters” or “stressers” — virtual hired muscle that can be rented to knock nearly any website offline.
Last fall, two 18-year-old Israeli men were arrested for allegedly running a vDOS, perhaps the most successful booter service of all time. The pair were detained within hours of being named in a story on this blog as the co-proprietors of the service (this site would later suffer a three-day outage as a result of an attack that was alleged to have been purchased in retribution for my reporting on vDOS).
That initial vDOS story was based on data shared by an anonymous source who had hacked vDOS and obtained its private user and attack database. The story showed how the service made approximately $600,000 over just two of the four years it was in operation. Most of those profits came in the form of credit card payments via PayPal.
But prior to vDOS’s takedown in September 2016, the service was already under siege thanks to work done by a group of academic researchers who teamed up with PayPal to identify and close accounts that vDOS and other booter services were using to process customer payments. The researchers found that their interventions cut profits in half for the popular booter service, and helped reduce the number of attacks coming out of it by at least 40 percent. Continue reading Following the Money Hobbled vDOS Attack-for-Hire Service