#QUEZ STRESSER HOME CONNECTION SERIES#
For example, according to the criminal information, in November 2016, a Betabooter subscriber launched a series of DDoS attacks against a school district in the Pittsburgh, Pennsylvania, area that not only disrupted the school district’s computer systems, but affected the computer systems of 17 organizations that shared the same computer infrastructure, including other school districts, the county government, the county’s career and technology centers, and a Catholic Diocese in the area.ĭuring the period of the conspiracy, Usatyuk and a co-conspirator gained in excess of $550,000 from charging subscriber fees to paying customers of their booter services and selling advertising space to other booter operators. The DDoS attacks launched by the booters also harmed computer systems that were not directly targeted.
To launch a DDoS attack using a booter, a cybercriminal often needs only a web browser and an online payment tool to subscribe to a provider, provide instructions for attacking a victim computer system, and deliver payment. “Booters” or “Stressers” are a class of publicly available, web-based services that allow cybercriminals to launch distributed DDoS attacks that overwhelm a target computer system with unrequested traffic and, in turn, “boot” or “drop” the victim from the internet for a relatively small fee or no fee at all. “By calling out those criminals who hide behind their computer and launch attacks, the FBI is sending a strong message that we will work tirelessly with our law enforcement partners to investigate and hold all criminals accountable, no matter what weapon they use to terrorize others.” “This sentence demonstrates the FBI’s continuous commitment to unmasking malicious actors behind these type of egregious cyberattacks,” said Special Agent in Charge John Strong of the FBI’s North Carolina Field Office. Anyone who weaponizes web traffic in this manner will be vigorously pursued and prosecuted by my office.” “The operation and use of these services to disrupt the operations of our businesses and other institutions cannot be tolerated. for the Eastern District of North Carolina. “DDoS-for-hire services pose a malicious threat to the citizens of our district, as well as districts across the country, by impeding critical access to the internet and jeopardizing safety and security in the process,” said U.S. “The Criminal Division and our law enforcement partners will remain vigilant in protecting the American public from these types of sophisticated, far-reaching threats.” Benczkowski of the Justice Department’s Criminal Division. “The defendant made hundreds of thousands of dollars by launching countless indiscriminate cyber-attacks that victimized various segments of American society,” said Assistant Attorney General Brian A. The illegal services included ExoStress.in, (“ExoStresser”),, (“Betabooter”),, , and. Usatyuk also was ordered to forfeit $542,925 in proceeds from the scheme, as well as dozens of servers and other computer equipment that facilitated the scheme and/or constitutes its proceeds.Īccording to the criminal information, Usatyuk combined with a co-conspirator to develop, control and operate a number of booter services and booter-related websites from around August 2015 through November 2017 that launched millions of DDoS attacks that disrupted the internet connections of targeted victim computers, rendered targeted websites slow or inaccessible, and interrupted normal business operations. District Court for the Eastern District of North Carolina. An Orland Park, Illinois, resident was sentenced yesterday to 13 months in prison, followed by three years of supervised release on one count of conspiracy to cause damage to internet-connected computers for his role in owning, administering and supporting illegal booter services that launched millions of illegal denial of service, or DDoS, attacks against victim computer systems in the United States and elsewhere.Ĭhief U.S.