Skip to main content

Going After the People Behind DDoS Attacks

DDoS attacks happen every day. Well-prepared organizations can repel an attack with few repercussions. Poorly-prepared organizations sustain the attack, often to their detriment. They experience downtime, lost business, and customer loss of confidence, and they might even be subjected to ransom demands. Lately there has been a rash of attacks where the perpetrators have demanded a ransom paid in Bitcoins in order to avoid or stop the attack.

how to report a ddos attack?

Whatever the circumstances, many attacks have one thing in common: the victim organization rarely reports the crime to law enforcement if they don't “have to.” The reasons for no report range from not wanting to garner the attention that an investigation would bring, to the belief that the attackers will never be brought to justice anyway, so why bother? Of course, some attacks are so high profile that law enforcement feels compelled to get involved.

Fortunately for everyone, the “lack of justice” excuse is diminishing. Law enforcement agencies around the world are having some success in busting the people behind the attacks.

The most notable bust came in December 2015 with Operation Pleiades, in which European authorities arrested two people in Bosnia and Herzegovena who are connected to the cyber crime group DD4BC (DDoS For Bitcoins). One of the two individuals that were arrested is described as being a leader of the loosely affiliated criminal group. DD4BC has been definitely linked to a series of DDoS extortion attacks over the past 18 months, many of which were targeting online gambling sites.

In announcing the arrests, a statement from Europol said, “The action was initiated as part of a global law enforcement response against the criminal organisation. Key members of the organised network were identified in Bosnia and Herzegovina by the UK Metropolitan Police Cyber Crime Unit (MPCCU) which provided vital information to the investigation. Police authorities from Australia, France, Japan, Romania, the USA, Switzerland and INTERPOL supported the coordinated activities.”

The statement further said, “Operation Pleiades resulted in the arrest of a main target and one more suspect detained. Multiple property searches were carried out and an extensive amount of evidence was seized.” It's possible that the arrest of more DD4BC members is likely in the coming weeks and months.

Comments

Popular posts from this blog

Cloud-based DDoS Protection

Don’t let the DDoS attack interrupt your business operation for reputational and financial loss. Use cloud-based denial of service protection to prevent getting hacked. Denial-of-service attack definition Anyone with bad intentions can hire a hacking service for a targeted attack. Malware tools are accessible, easy to use, and effective. Not just large companies, but cybercriminals are looking for any size vulnerable victims, including personal blogs, e-commerce shops, small to medium businesses. One type of attack is particularly dangerous and increasingly common. It is called distributed denial of service attack, or DDoS for short. In a DDoS attack, a set of compromised, distributed systems –could be servers, home computers, Internet-of-Things devices, anything connected to the internet– is used to overwhelm a targeted system with a flood of requests, to the point in which the attacked system gets saturated enough to refuse to work. Since the flood comes from many scattered

What are the English proficiency levels?

 The classification used by language courses - basic, intermediate and advanced - is not exactly related to the levels of English proficiency that are based on the categorization of the European Common Framework or Framework. This guide considers the international standard ranking, which divides the degree of knowledge of the language into: See more:  Amazon Saheli Quiz Answers A1 (beginner) A2 (basic) B1 (intermediate) B2 (post-intermediate) C1 (advanced) C2 (proficient) Before you make any assessment, no matter how much you have prepared for it, pre-tests are recommended to find out where you would be classified if you took the test at that time. If your rating is below B2, in little or nothing a proficiency certificate will help you. Although many foreign universities consider the B1 level sufficient, the classes are already so complex even for those who have a perfect level of understanding of English, imagine for those who do not speak the language. Professionally speaking, below

What are the benefits of purchasing a SaaS model?

 Knowing what SaaS is and deploying this technology in your business will establish quite a differentiator . After all, companies that host their cloud services can increase the degree of efficiency applied to the processes, improving the results obtained.  So, do you want to know the other benefits that this service model provides? Just keep following this post! 1. More accurate software licensing costs Software licensing costs are often among the main factors that contribute to the weight of the IT sector in a company's budget. Therefore, reducing this expense (or making it more precise) is an objective that is part of the daily life of any IT manager. In this sense, SaaS is considered one of the best alternatives on the market. With SaaS, the company pays only for the number of active licenses. This dramatically eliminates spending on software licenses that are not in use. With this, the company can prepare itself in advance in case of projects or major structural changes. The s