Security News > 2021 > September > Admin of DDoS service behind 200,000 attacks faces 35yrs in prison
32-year old Matthew Gatrel of St. Charles, Illinois, ran two websites that allowed paying users to launch more than 200,000 DDoS attacks on targets in both the private and public sector.
He ran two sites, DownThem and Ampnode, both enabling DDoS attacks.
Gatrel used DownThem to sell subscriptions for his DDoS services and AmpNode offered "Bulletproof" server hosting options to customers that needed servers pre-configured with DDoS attack scripts and lists of vulnerable systems that could amplify the assault.
According to the documents, users are responsible for launching over 200,000 DDoS attacks.
Customers could choose from multiple subscriptions, each coming with various attack capabilities such as duration, strength, or the possibility of concurrent attacks.
With the sight set on a target, the service would use the AmpNode attack servers to run "Reflected amplification attacks" using resources from "Hundreds or thousands of other servers connected to the internet."
News URL
Related news
- CUPS vulnerabilities could be abused for DDoS attacks (source)
- Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps (source)
- Recently patched CUPS flaw can be used to amplify DDoS attacks (source)
- Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors (source)
- Largest Recorded DDoS Attack is 3.8 Tbps (source)
- New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries (source)
- U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks (source)
- SafePay ransomware gang claims Microlise attack that disrupted prison van tracking (source)