Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Government The Internet United States Technology

FBI Shuts Down 15 DDoS-For-Hire Sites (techcrunch.com) 49

The FBI has shut down the domains of 15 high-profile distributed denial-of-service (DDoS) websites. "Several seizure warrants granted by a California federal judge went into effect Thursday, removing several of these 'border' or 'stresser' sites off the internet 'as part of coordinated law enforcement action taken against illegal DDoS-for-hire services,'" reports TechCrunch. "The orders were granted under federal seizure laws, and the domains were replaced with a federal notice." From the report: Prosecutors have charged three men, Matthew Gatrel and Juan Martinez in California and David Bukoski in Alaska, with operating the sites, according to affidavits filed in three U.S. federal courts, which were unsealed Thursday. The FBI had assistance from the U.K.'s National Crime Agency and the Dutch national police, and the Justice Department named several companies, including Cloudflare, Flashpoint and Google, for providing authorities with additional assistance. In all, several sites were knocked offline -- including downthem.org, netstress.org, quantumstress.net, vbooter.org and defcon.pro and more -- which allowed would-be attackers to sign up to rent time and servers to launch large-scale bandwidth attacks against systems and servers.
This discussion has been archived. No new comments can be posted.

FBI Shuts Down 15 DDoS-For-Hire Sites

Comments Filter:
  • by Seven Spirals ( 4924941 ) on Thursday December 20, 2018 @07:38PM (#57839286)
    Jesus thank you FBI for giving us ONE FUCKING STORY that didn't bring in some more dipshit partisans.
    • From personal experience with the FBI's Computer Crime Lab, I'd not give them credit for this action without compelling proof. They've not yet shown they're capable of doing the actual work to block, capture, or prosecute any computer criminals in any of the cases I know of personally. The few crimes listed on their website show no sign that they've done nothing successful except to claim credit for others', and they've passively interfered in every investigation I do know of personally. They accept reports

      • by ShanghaiBill ( 739463 ) on Thursday December 20, 2018 @09:31PM (#57839694)

        I have also had direct dealings with the FBI's Computer Crime Lab. The team leader had a degree in history, and his subordinates were even more clueless than he was. The only way they could have done this is if the three named companies that provided them "addition assistance", handed them all the evidence on a silver platter. Even then, it is a miracle that they didn't screw it up.

        The FBI prides themselves on their "special agents" being able to "do it all" without any actually being "special". But, at least with tech crimes, that clearly isn't working.

        • I hesitate to name the labs I've dealt with to preserve my pseudonymous status. I'm willing to say that I've dealt with them on 4 distinct occasions in the last 10 years, simply to report criminal activity I or my colleagues had tracked back to its source, and they did nothing with the information. Their position as the agency to report criminal computer activity actively and refusing to release the evidence to others interferes with other agencies.

      • Well, I my original post was a bit tongue and cheek. However, I had one experience that validates your main assertion. I did a contract job about 15 years ago for a company that had a severe internal IT vandalism incident (a "hack" as journalist would say). This guy was really, really, wanting prison. He used the corporate VPN and didn't make tremendous efforts to hide his tracks (they made him really made, I heard). The company apparently used an Excel spreadsheet to keep their passwords in. They were like
    • So your claim is that you never posted?
      • Well, I wouldn't consider myself any type of partisan since I don't hold views that are compatible with any party. I have right, left, and centrist political opinions. However, those that want to label me as such are free to do so. I do believe in freedom.
  • Now if they could just take down "Lisa from Credit Card Services" the phone scammer that called me on my cellphone just before I got to this.

  • by Anonymous Coward

    Luckily slashdotting is a thing of the past with this piddely audience.

  • Maybe we can get through Christmas without some online game going down because something they did offended a 4chan anon.

    Maybe?

  • Domain Seizure means we can still reach the actual site by its translated IP Address, right?

    Not that I support their Business Model, just to know how much power the US Guv-a-mint actually does have.

    Thanks.

    • If the site has a dedicated web server, then yeah the IP address will work even if the domain name gets taken down and DNS redirected.

      But most small websites are hosted on shared servers [bluehost.com]. Dozens or hundreds of websites are hosted on a single server and all have the same IP address. The site that gets loaded in your browser depends on the domain name you used to get to that IP address.
  • I turned in several sites about four years ago and never heard anything back.

  • No one RTFAs these days...

Congratulations! You are the one-millionth user to log into our system. If there's anything special we can do for you, anything at all, don't hesitate to ask!

Working...