The people behind it uses botnets in order to hide from forensics, however, human mistakes of the people behind it may one way or another can blew their cover. Including other school districts, the county government, the county’s career and technology centers and a Catholic Diocese in the area ,” the court record explained.ĭDoS-for-hire businesses are not new in the field of cybersecurity field, but not a popular one either.
#Why cant i use quez stresser series#
For example, in November 2016, a Betabooter subscriber launched a series of DDoS attacks against a school district in Pittsburgh, Pennsylvania area that not only disrupted the school district’s computer systems, but affected the computer systems of seventeen organizations that shared the same computer infrastructure.
“ The Subject Booters’ DDoS attacks also harmed computer systems that were not directly targeted. Including DDoS attacks against a school by its own student, who was his customer. Of all his services, ExoStresser is one of the most successful, as his customers can easily launch DDoS attacks against a target of their own choosing. The surveillance leading to the arrest of Usatyuk is not easy, since the surveillance started 3 years ago, in 2016. The Criminal Division and our law enforcement partners will remain vigilant in protecting the American public by prosecuting the cybercriminals responsible for these sophisticated and harmful schemes ,” emphasized Assistant Attorney General Benczkowski. organizations for more than 100,000 hours. “ For over two years, Sergiy Usatyuk conspired to launch millions of DDoS attacks that paralyzed the computer systems of U.S.
With the IP address in hand, authorities were able to detect the hosting provider, the chat logs and technical support correspondents between him and his ‘customers’ in this illegal DDoS business. The IP address he used in Darien Illinois and Hollywood, Florida where verified as his by the investigators, which brought strong suspicion about his Internet activities. Usatyuk was caught due to his own negligence when his home IP address attempted to log in to the cloud servers was later found out during the digital forensic investigation.
As of September 12, 2017, ExoStresser advertised on its website (exostress.in) that its booter service alone had launched 1,367,610 DDoS attacks, and caused targets to suffer 109,186.4 hours of network dowtime (4,549 days), ” the court record said. “ In just the first 13 months of the 27-month long conspiracy, the Subject Booters’ users ordered approximately 3,829,812 DDoS attacks.