Operations
1/12/2016
01:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

'Main Target' Of DD4BC DDoS Extortionist Group Arrested

International group of law enforcement agencies zeroes in on group that spawned the DDoS for Bitcoin cyber-extortion business.

Europol announced today that, through the cooperative efforts of international law enforcement agencies, a "main target" in the DD4BC ("DDoS for Bitcoin") threat group has been arrested and another suspect detained. The suspects' names have not been released.

DD4BC, and the copycats it spawned, extorted companies for Bitcoin payouts by threatening them with distributed denial-of-service attacks, sometimes adding the threat of public shaming via social media after the DDoS.

DD4BC first emerged in 2014 and attacked over 140 companies, focusing first on online gaming companies, then expanding its targets to online currency exchanges and entertainment and financial services companies. The payments it demanded ranged from 10 BTC to 200 BTC ($4,474 to $89,480 at current exchange rates).

Although DD4BC's activities dropped off considerably after they were outed by an Akamai report in September, a new group, Armada Collective emerged, using DD4BC's successful business model. Soon after, Armada Collective's behavior became much more aggressive -- so much so, that researchers at Recorded Future believed it was actually a third group using the Armada Collective name. This group had the power to conduct stronger DDoSes than the original group, and began demanding outlandish sums -- asking three Greek banks for 20,000 BTC ($8.9 million) apiece.

Although the banks declined to pay, it's clear DD4BC kicked off a rise in a new form of cyber-extortion.

“These groups employ aggressive measures to silence the victims with the threat of public exposure and reputation damage," said Wil van Gemert, Europol’s Deputy Director Operations, in a statement. "Without enhanced reporting mechanisms law enforcement is missing vital means to protect companies and users from recurring cyber-attacks. Police actions such as Operation Pleiades highlight the importance of incident reporting and information sharing between law enforcement agencies and the targets of DDoS and extortion attacks.”

The international effort to bring down leaders of DD4BC, called Operation Pleiades, included law enforcement agencies in Austria, which initiated operational activity, Germany, the United Kingdom, Bosnia and Herzegovina, Europol's European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce.

“The collateral damage associated with successful DDoS attacks can be exponential," says Corero chief operating officer Dave Larson. "When service providers lack proper protection mechanisms to defeat attacks in real-time, the costs associated with the outages are wide ranging and the impact to downstream or co-located customers can be devastating.

"Further fueling this epidemic is the payout on these ransom related threats," says Larson. "DDoS attack tools are easy to come by and perhaps even easier to use. This is an easy and anonymous recipe for anyone looking to make a quick buck, and the victims are proving this every day.  Properly prepared organizations can stem this tide by refusing the ransom requests, secure in the knowledge that they are protected and can withstand the storm.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers