SolarWinds SEM is designed to detect exterior threats like DDoS attacks by collecting, normalizing, and correlating. SEM is widely known for its SIEM log monitoring, but it is also equipped with extensive capabilities for anti-malware threat detection and blocking. In other words, they found two ways to make profits from a single kind of cyberattack.Īfter the court sentenced him, however, Usatyuke was ordered to forfeit $542,925.Īpparently his financials are a lot like his DDoS attacks. SolarWinds Security Event Manager uses a multilayered approach to DDoS detection. "During the period of the conspiracy, gained in excess of $550,000 from charging subscriber fees to paying customers of their booter services and selling advertising space to other booter operators." Two years is a long time to run a booting scheme. It's also enough time for a booting scheme to become extremely profitable.Īnd until they got caught, Usatyuke and his co-conspirator were laughing all the way to the bank. "The Criminal Division and our law enforcement partners will remain vigilant in protecting the American public from these types of sophisticated, far-reaching threats." How much can you make through DDoS-as-a-service?
#Ddosing a site using quez stresser crack
"Usatyuk combined with a co-conspirator to develop, control and operate a number of booter services and booter-related websites that launched millions of DDoS attacks that disrupted the internet connections of targeted victim computers, rendered targeted websites slow or inaccessible, and interrupted normal business operations."Īccording to the report, he used illegal services with names such as ExoStress.in, ("ExoStresser"),, ("Betabooter"),, ,, and to commit his crimes.Īnd his actions are just one part of the problem: the crime itself points to the massive threat that DDoS-for-hire services pose in the U.S.īenczkowski explains that the government is trying to crack down on this type of cyberattack.
What did the DDoS scheme look like?įor more than two years, Usatyuk "victimized various segments of American society," says Assistant Attorney General Brian A. His attacks flooded the web and private servers with massive amounts of data, causing network downtime for many organizations. Usatyuk of Illinois to 13 months in prison for his role in a booter scheme that launched millions of illegal DDoS (distributed denial of service) attacks. federal court in North Carolina just sentenced 21-year-old Sergiy P. One of the most popular,, was taken down by police in 2018 and was responsible for over four million attacks.Įuropol recently launched an operation to track down its 150,000 customers.Another booter is brought to justice for launching DDoS attacks.Ī U.S. Usatyuk and his co-conspirator are said to have made over $550,000 from their DDoS-for-hire services.īooter or stresser services are a popular way for budding cyber-criminals with little technical know-how to make money from DDoS attacks. Anyone who weaponizes web traffic in this manner will be vigorously pursued and prosecuted by my office.” “The operation and use of these services to disrupt the operations of our businesses and other institutions cannot be tolerated. “DDoS-for-hire services pose a malicious threat to the citizens of our district, as well as districts across the country, by impeding critical access to the internet and jeopardizing safety and security in the process,” said US attorney for the Eastern District of North Carolina, Robert Higdon Jr. One Betabooter customer launched DDoS attacks against a school district in Pittsburgh that also impacted 17 organizations that shared the same underlying infrastructure, including other school districts, the county government, career and technology centers and a Catholic Diocese, according to the indictment. He’s said to have owned and managed illegal booter services which were used to launch DDoS attacks on millions of victims in the US and abroad.Īs part of the verdict, Usatyuk has been ordered to forfeit $542,925 in proceeds from the scheme, and hand over dozens of servers and other computer equipment used in the operation.įrom around August 2015 to November 2017, he’s said to have teamed up with a co-conspirator to run several booter sites including: ExoStress.in and .Īs well as the intended targets, some of the attacks also affected other organizations. Usatyuk, 21, of Orlando Park, was charged with one count of conspiracy to cause damage to internet-connected computers.
An Illinois man has been sentenced to 13 months behind bars after participating in a DDoS-for-hire scheme which made him over half a million dollars.