Connect with us

DDoS Attacks

Michigan High School Student Facing Charges After DDoS’ing School Network

Published

on

A student at Monroe High School in Monroe, Michigan, was recently caught conducting a distributed denial of service attack (DDoS), and Monroe Public Schools Superintendent Barry Martin says the district will be pressing charges.

// -- Discuss and ask questions in our community on Workplace.

Over a period of two weeks, the unnamed student managed to take the network down for ten to fifteen minutes at a time during the school day. This had a heightened effect on the district, as modern-day high schools rely heavily on the Internet for administration as well as classroom instruction.

“We are so reliant on the Internet that we can’t afford to have down time,”

said Stephen McNew, the superintendent of the district in which the student attended school.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

No Sensitive Data Compromised

Despite having success at being disruptive, an act that the student considered to be a prank, no sensitive documents, e-mails, or files were ever compromised, which should contribute greatly to his defense. Merely disrupting communications is far less of a crime than is stealing sensitive information about other students or private communications between staff members.

“A Good Student”

Barry Martin called the alleged hacker “a good student” in comments to the Monroe News but said that this act could not be tolerated, and charges would be filed. DDoS is a federal felony, but from the sounds of it, the FBI has not yet been involved in the case. It is taken very seriously when the targets are larger organizations or government institutions, and ordinarily those who are serious about conducting DDoS attacks are careful to cover their tracks.

It is not yet evident how the student was found to be a suspect in the case, but in the town of roughly 20,000 people, the pool of likely suspects is rather slim. The profile would be a student with high grades and extreme computer aptitude. This would make the pool of likely suspects even smaller. The way that high schools often conduct such investigations, the student would have been brought in front of a police officer and interrogated until he confessed. Like as not, school officials would pretend to know already that he was guilty, and he would confess. Equally as likely, the student bragged about it to another student, who then turned him in.

Also read: DDoS Attacks Land 51-Year-Old UK Hacker Under Arrest

Another thing that the administrators said about the student was that he probably didn’t know the seriousness of what he was doing. This is in line with existing research that has concluded that adolescents are less likely to consider the consequences of their actions before taking them.

Locals Have Mixed Feelings

Many locals on the Monroe News Facebook page felt that a felony would be too stern a response for the gifted student’s prank. After all, in the end, the one thing he illustrated was that the school district had a weak network infrastructure that needs upgrading. Especially if, as administrators have said, they are extremely reliant on the Internet in daily teaching.

Here are some of the comments to the page:

2-monroe-1

2-monroe-2

2-monroe-3
What do you think? Is a felony charge too harsh for a simple DDoS attack on a weak school network? Or should the student be given community service and be allowed to finish his high school education? Share above and comment below.

Images from Shutterstock and phm.link.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

5 Comments

5 Comments

  1. ken Code

    April 5, 2015 at 10:38 am

    “The profile would be a student with high grades” – huh? Most of the kids I hung with didn’t give a sh*t about their grades, nor did I. Yes, I graduated too, like that even matters. Most of us just read books on the subjects we were interested in and continue to employ us even today. “brought in front of a police officer and interrogated until he confessed” – WTF? “school officials would pretend to know already that he was guilty, and he would confess” – WTF?!!!! “the student bragged about it to another student, who then turned him in” – dude, if you’re gonna gray hat, keep your frign mouth shut. “the one thing he illustrated was that the school district had a weak network infrastructure that needs upgrading” – ok, so hire him part time to do security audits for the school district. The best way to learn is to experiment.. Just get permission from the sysadmin or principal first (by email so that it’s documented), tell them you have found holes in their network and coordinate a time to show them.

    • englishvinal

      June 28, 2015 at 3:57 pm

      Oh … posh! You are just another new worlder…. waiting to go poof like all the rest of them.
      Sure the kid should “be a team player” right?
      The boy was probably set up by “system oriented supporters” just like you… more zombies to worry about eating us few rebels alive.

  2. englishvinal

    April 5, 2015 at 4:25 pm

    Before this “dependency scenario” is over, this school …. this nation and every jury-rigged computer dependent system is going to end…… and not well.
    You would think that the bobbing heads up the food chain would focus on lessening the computer dependency, and designing a system less vulnerable instead of prosecuting the “messenger”.

    • englishvinal

      June 28, 2015 at 3:54 pm

      Russia is using IBM typewriters these days for important stuff……… and filing cabinets still exist… I heard that the Chinese government is doing the same… True? Don’t know for sure, but I think that they are smart enough to avoid the inevitable hack that lies in wait.

  3. englishvinal

    June 28, 2015 at 3:52 pm

    If the STUPID officials at the school… are dumb enough to become that dependent on computers…. and are so lazy that nothing gets logged “the old fashioned way… just in case” then I will have a good giggle when the go dark!

You must be logged in to post a comment Login

Leave a Reply

Cybersecurity

The Biggest DDoS Attack of 2016 Was Caused by an Angry Gamer

Published

on

October 2016 saw the biggest DDoS attack of the year target a DNS services company called DYN. The massive attack pumped more than one terabit of data per second, crashing the company’s servers. Even tough Dyn attempted to mitigate the attack, major websites such as Twitter, Netflix and Reddit were temporarily taken down.

// -- Discuss and ask questions in our community on Workplace.

Hacked.com reported that one cryptographer called it before it happened, as someone was testing the defensive capabilities of companies who provide core internet services. Even though network-wide outage didn’t occur, it still crashed a part internet in the US.

Now net information came to light. Reportedly, a very angry gamer had a grudge against Sony’s PlayStation Network. Dale Drew, CSO of Level 3 Communications, stated:

We believe that in the case of Dyn, the relatively unsophisticated attacker sought to take offline a gaming site with which it had a personal grudge and rented time on the IoT botnet to accomplish this

Drew didn’t name Sony’s PlayStation Network, but the Wall Street Journal found sources that did.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

As it turns out, one gamers’ grudge was enough to take down a few major websites. It might seem odd, but the IoT brought vulnerabilities that allow hackers to create entire armies with the use of botnets – in this case, the Mirai botnet.

How One Individual Crippled the Internet

According to Forbes, the individual found hackers on a dark net criminal forum selling access to huge armies of IoT devices infected with the Mirai botnet. The angry gamer paid $7500 for temporary access to the powerful cyberweapon. Then, in an act of revenge, he aimed its “cannons” at Dyn.

Mikko Hypponen, Chief Research Officer at F-Secure, even said on Twitter the ad for the Mirai botnet was on the Alpha Bay form. Alpha Bay is a very popular deep web market, that surged in popularity after Silk Road’s era.

The attack on Dyn was close to the world DDoS record, which was accomplished against OVH, a French hosting provider. The record was at over 1 terabit per second, little above the DDoS attack that recently crippled the internet.

Image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Cybersecurity

Botnet DDoS Attacks More Sophisticated Than Ever

Published

on

DDoS

 

// -- Discuss and ask questions in our community on Workplace.

A new report by security firm Kaspersky Lab has revealed that as many as 67 countries’ resources and installations have been targeted by botnet-based DDoS attacks, in Q3 2016 alone.

The world received a rude jolt of the increasing threat of cyberattacks when DNS provider Dyn was targeted in an unprecedented DDoS attack in October 2016. That cyberattack was caused from a botnet that included IoT (Internet of Things) devices like surveillance cameras and routers. Suffice to say, the DNS blackout was undoubtedly the most notable DDoS-induced disruption in a growing trend of botnet-assisted DDoS attacks.

A new report by Kaspersky Lab has now revealed that servers used for such attacks have seen a considerable increase. So too, has the number of sophisticated DDoS attacks emanating from encrypted traffic.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

A staggering majority of the targeted resources (62.6%) by botnet DDoS attacks were located in China, in a continuing trend. China, the United States and South Korea, in that order, see the unfortunate distinction of leading the charts in both – the number of DDoS attacks and the number of targets. While China and South Korea saw the number of victims decrease, the number of attacks on resources located in the U.S., Russia and Japan has increased.

Still, despite the decrease in the total number of attacks registered, China remains the country with the most targeted sources. One particularly popular Chinese search engine saw 19 mammoth botnet-DDoS attacks while one Chinese internet provider bore the brunt of the longest attack in the entire quarter, clocking a total of 184 long hours. That’s over a week of one sustained DDoS attack!

The report also revealed another notable takeaway, with Linux botnets increasing even further, with 78.9% of all detected attacks in Q3 2016 stemming from Linux botnets.

“Smart” Attacks on the Rise

Attacks using encryption of transmitted data, typically known as “smart” attacks have also grown in number. A smart-attack usually targets parts of the website that are heavy on scripts, leading to an increased load when compared to other parts of the website. For instance, a smart attack would typically target a relatively small number of queries toward a search form, with an encrypted connection. Since the attack uses low intensity encrypted traffic, they usually escape the mitigation filters employed by specialized DDoS protection providers.

Elaborating on these attacks, Kirill IIganaev, head of Kaspersky DDoS protection stated:

This method is growing in popularity because amplification attacks are becoming more complicated and inefficient for cybercriminals.

Furthermore, IIGanaev points to the concentrated effort in moving websites away from the traditional HTTP protocol to a more secure, encrypted connection standard like HTTPS.

He added:

All this suggests that the number of encryption-based attacks will only grow, meaning developers have to immediately start revising their anti-DDoS protection measures, and owners of web resources need to take a responsible approach to choosing a security solution.

Image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Blockchain

Is a Decentralized Internet the Solution to Outages?

Published

on

“Attacks that we witnessed today were possible mainly because there is a centralized infrastructure which could have been targeted,” said Piotr Janiuk, CTO of  Golem,  which seeks to decentralize the internet using peer-to-peer technology. “The attack itself isn’t easy to carry out, but it is obvious that even the backbone infrastructure behind the Internet contains single points of failure which are prone to such malicious activity – even though the infrastructure may comprise multiple machines. As of today, the trend is to move towards distributed solutions and the main problem is the lack of standard way of setting up the infrastructure.”

// -- Discuss and ask questions in our community on Workplace.

Golem  is among a legion of technologists who believe a decentralized everything is the best way avoid problems such as the widespread outages experienced in the US, the UK and western Europe going into the weekend.

The source of the Friday outages is New Hampshire internet infrastructure company, Dyn, which endured two separate cyber attacks within hours of each other. Dozens of websites, including PayPal, Twitter, Spotify, Netflix and others went down.

Netflix

Netflix was among several major websites that saw an outage.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

 The outages began in the Eastern United States before affecting other parts of the country. Gizmodo cited five dozen sites seemingly affected by the attack, including CNN, HBO Now, Mashable, the New York Times, People.com, the Wall Street Journal and Yelp! affected by the attacks. U.S. officials from the U.S. State Department of Homeland Security and the Federal Bureau of Investigation opened an investigation into the attacks.

Amazon reported the outage affected users in Western Europe.  Twitter and select news sites were out in London on Friday evening. PayPal Holdings Inc. experienced outages in “certain regions” affecting payments.

Spotify, Reddit, AirBnB, the Verge all reportedly suffered outages. Amazon.com Inc’s web services, cloud computing service, reported outages, as well. That meant companies like Visa, Twitter and Netflix went down. Could all this be avoided with a decentralized internet?

“If you do a Google patent search you will see the state-of-the-art there,” Maidsafe CEO David Irvine told Hacked.com. “It’s very new.”

Maidsafe, and it’s SAFE network is modelled on colonies in nature, servers and intermediaries do not make logical sense and we sort of all know that in our deepest thoughts. Some say a decentralized internet is not possible.

“DDOS depends on a target, in SAFE the target is everyone’s computers,” Mr. Irvine said.  “An analogy would be DDOS is like swatting a large fly, in SAFE the large fly is a mass swarm of mossies which makes it hard even with 8 arms filled with fly swatters.” Mr. Irvine hopes the SAFE network might help to form the primordial soup of a decentralized internet.

SAFE uses xor addressing, a type of data structure used in computer programming, which means any node outages will be covered by the nearest nodes.

“This makes those mossies like zombie mossies or perhaps hydra like,” Mr. Irvine said.

This is stretching a little, he admits. Since no such decentralized networks exist, it’s difficult to know what one’s vulnerabilities might be. Maidsafe employs university research to help answer some questions. Maidsafe uses data chains, which are different from blockchains.

The Maidsafe model does not assume every node/person needs to know and agree on all information like in the Bitcoin blockchain model. “Detailed information is local and less detailed is more global,” he said. “This is like posting a letter, the closer to the destination the more info is known of the destination.”

The Golem Project’s vision of a decentralized internet entails running the ‘Golem app.’

“It’s hard to predict the definite direction in which distributed solutions will go but if infrastructure similar to Golem (production version with lots of nodes) was up and running then any service running on top of it would be resilient to this type of attacks,” Mr Janiuk told Hacked.com. “Of course at this point there is still a lot of work in the field not only because the infrastructure has to be deployed but also all sorts of utilities which are available today would have to be tailored to this new paradigm.”

He adds: “It seems that the centralised Internet of today is more and more pushed to its limits and the change of paradigm is inevitable in a longer run.” If the Internet is to grow and thrive, then the decentralization seems to be one of the best (if not the best) options.”

Images from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Continue Reading

Trending