The federal prosecutors in Alaska and Los Angeles have charged six individuals with cybercrime activities wherein the alleged operators used public websites to offer cyberattack services.
According to a recent report, the six individuals were using a total of 48 domains to provide these services; the Federal department has seized the internet domains, and they are no longer functional.
The six individuals have been charged with criminal charges, and the court is proceeding with strict penalties and sentences. According to the FBI, the websites provided sophisticated Distributed Denial of Service (DDoS) attacks and targeted specific victims on behalf of clients who purchased the service from the websites. The 48 domains were directly involved with the attack campaign and offered DDoS services called the “booter.”
The FBI is seizing the websites and continuously evaluating the extent of the service and all the individuals involved in the campaign. While the services were operating, the attackers claimed many victims in the United States and other countries, education institutions, government agencies, gaming platforms, and other domains, leaving millions of individuals and businesses in helpless situations.
For the uninitiated, a Disturbed Denial-of-Service (DDoS) attack is an attempt to halt a machine or network, rendering it unreachable to its intended users. DDoS attacks achieve this by flooding the target with traffic or transmitting information that causes it to crash.
The attacker’s forte was planned DDoS attacks, and they were able to flood known businesses and individual corporations with unfiltered spam traffic.
“Thousands of communications between booter site administrators and their customers … make it clear that both parties are aware that the customer is not attempting to attack their computers,” the FBI said in an affidavit filed in support of court-approved warrants to seize the booter sites.
Moreover, the reports say that all six defendants in the operations were offering booter services, and each defendant allegedly operated at least one website to provide DDoS attack services to prospective clients.