Attacks/Breaches
10/4/2013
09:41 AM
Connect Directly
RSS
E-Mail
50%
50%

Operation Payback: Feds Charge 13 On Anonymous Attacks

Men accused of launching DDoS attacks against MPAA, RIAA, Visa, MasterCard and other organizations perceived to be hostile to piracy sites and WikiLeaks.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
Thirteen men have been charged by a federal grand jury with participating in a series of 2010 and 2011 attacks organized under the banner of the Anonymous hacktivist collective.

A 28-page indictment, handed down in federal court in Alexandra, Va., charged the men with one count of "conspiracy to intentionally cause damage to a protected computer" during an online attack campaign that included such targets as the websites of the Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA), the U.S. Copyright Office of the Library of Congress, as well as Visa, MasterCard and Bank of America.

According to the indictment, the attacks were carried out under the banner of Operation Payback -- aka "Operation: Payback Is A Bitch" -- and were first launched to target anti-piracy organizations in the United States, as well as Australia, Britain, France, the Netherlands and other countries. The attacks later expanded to target organizations that were perceived to be hostile to WikiLeaks, such as Visa and MasterCard, which blocked the flow of funds to the whistle-blowing website after it began posting secret U.S. diplomatic cables.

[ How far can the FBI go with suspected computer criminals? Read Stratfor Hacker: FBI Entrapment Shaped My Case. ]

The Operation Payback attack campaign ran from September 2010 through January 2011. PayPal, which was also targeted -- but not cited in the indictment -- has said it suffered losses of $5.6 million as a result.

The 13 men charged -- along with some of the nicknames the indictment said they used online -- include: Thomas J. Bell, Zhiwei Chen ("Jack," "TickL"), Joshua S. Phy ("Anonyjosh"), Dennis Owen Collins ("iowa," "anon5"), Geoffrey Kenneth Commander ("jake," "bipto") Ryan Russell Gubele ("grishnav"), Jeremy Leroy Heller ("heelgea"), Timothy Robert McClain, Austen L. Stamm ("user_x"), Phillip Garrett Simpson ("jikbag"), Anthony Tadros ("Winslow"), Robert Audubon Whitfield ("mightymooch"), and Wade Carl Williams ("TheMiNd").

According to the indictment, the men "[engaged] in a coordinated series of cyber-attacks against victim websites by flooding those websites with a huge volume of irrelevant Internet traffic with the intent to make the resources on the websites unavailable to customers and users of those websites" -- meaning they launched distributed denial-of-service (DDoS) attacks. Williams was also accused of linking to an online site that listed the names, home address and phone number of the Bank of America CEO, as well as his wife, for harassment purposes.

The indictment said all 13 men used the DDoS attack tool known as Low Orbit Ion Cannon. The tool was originally distributed to Anonymous members with the promise that it could be used to launch one-click attacks against targets of the operator's choosing. During Operation Payback, target lists were detailed online -- including on IRC message boards -- so LOIC operators could join in.

Unbeknownst to less technically sophisticated LOIC users, however, was the fact that when the tool generated a stream of packets -- designed, en masse, to overwhelm a targeted site -- it would code the IP address of the attacker's computer into the packet stream unless the operator proactively disguised their IP address. As a result, PayPal and other attacked organizations were reportedly able to turn over log files that listed the IP addresses that had attacked them. In short order, the FBI began subpoenaing service providers and tying IP addresses to subscribers' identities.

These aren't the first charges to be filed against alleged Operation Payback participants, either in the United States or abroad. British authorities, for example, arrested four men in 2011 on charges of participating in a group called both "Nerdo" and "NikonElite," which targeted digital entertainment industry companies and later participated in Operation Payback attacks.

Three of those men pleaded guilty, while the fourth -- Christopher Wetherhead -- was found guilty in Dec. 2012 of one count of conspiracy to commit unauthorized acts with intent to impair the operation of a computer, in violation of Britain's 1990 Computer Misuse Act. British investigators said they'd identified the men after studying Anonymous IRC logs.

According to some legal experts, British authorities have tended to prosecute the organizers behind the Operation Payback attacks, while U.S. prosecutors have tended to pursue not just the organizers, but anyone who downloaded and used LOIC to join in the attacks.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
David F. Carr
50%
50%
David F. Carr,
User Rank: Apprentice
10/4/2013 | 9:37:44 PM
re: Operation Payback: Feds Charge 13 On Anonymous Attacks
It's always the stupid criminals that get caught.
mak63
50%
50%
mak63,
User Rank: Apprentice
10/4/2013 | 7:59:12 PM
re: Operation Payback: Feds Charge 13 On Anonymous Attacks
You would think that a hacker knows better than let his/her IP address be leaked into the packet stream. It sounds dumb to me. Couldn't have they use an open WiFi connection or/and a series of proxies? In case someone mentions MAC addresses, they can also be changed
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.