Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

1/12/2016
01:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

'Main Target' Of DD4BC DDoS Extortionist Group Arrested

International group of law enforcement agencies zeroes in on group that spawned the DDoS for Bitcoin cyber-extortion business.

Europol announced today that, through the cooperative efforts of international law enforcement agencies, a "main target" in the DD4BC ("DDoS for Bitcoin") threat group has been arrested and another suspect detained. The suspects' names have not been released.

DD4BC, and the copycats it spawned, extorted companies for Bitcoin payouts by threatening them with distributed denial-of-service attacks, sometimes adding the threat of public shaming via social media after the DDoS.

DD4BC first emerged in 2014 and attacked over 140 companies, focusing first on online gaming companies, then expanding its targets to online currency exchanges and entertainment and financial services companies. The payments it demanded ranged from 10 BTC to 200 BTC ($4,474 to $89,480 at current exchange rates).

Although DD4BC's activities dropped off considerably after they were outed by an Akamai report in September, a new group, Armada Collective emerged, using DD4BC's successful business model. Soon after, Armada Collective's behavior became much more aggressive -- so much so, that researchers at Recorded Future believed it was actually a third group using the Armada Collective name. This group had the power to conduct stronger DDoSes than the original group, and began demanding outlandish sums -- asking three Greek banks for 20,000 BTC ($8.9 million) apiece.

Although the banks declined to pay, it's clear DD4BC kicked off a rise in a new form of cyber-extortion.

“These groups employ aggressive measures to silence the victims with the threat of public exposure and reputation damage," said Wil van Gemert, Europol’s Deputy Director Operations, in a statement. "Without enhanced reporting mechanisms law enforcement is missing vital means to protect companies and users from recurring cyber-attacks. Police actions such as Operation Pleiades highlight the importance of incident reporting and information sharing between law enforcement agencies and the targets of DDoS and extortion attacks.”

The international effort to bring down leaders of DD4BC, called Operation Pleiades, included law enforcement agencies in Austria, which initiated operational activity, Germany, the United Kingdom, Bosnia and Herzegovina, Europol's European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce.

“The collateral damage associated with successful DDoS attacks can be exponential," says Corero chief operating officer Dave Larson. "When service providers lack proper protection mechanisms to defeat attacks in real-time, the costs associated with the outages are wide ranging and the impact to downstream or co-located customers can be devastating.

"Further fueling this epidemic is the payout on these ransom related threats," says Larson. "DDoS attack tools are easy to come by and perhaps even easier to use. This is an easy and anonymous recipe for anyone looking to make a quick buck, and the victims are proving this every day.  Properly prepared organizations can stem this tide by refusing the ransom requests, secure in the knowledge that they are protected and can withstand the storm.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
New FISMA Report Shows Progress, Gaps in Federal Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13139
PUBLISHED: 2019-08-22
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the ...
CVE-2019-15325
PUBLISHED: 2019-08-22
In GalliumOS 3.0, CONFIG_SECURITY_YAMA is disabled but /etc/sysctl.d/10-ptrace.conf tries to set /proc/sys/kernel/yama/ptrace_scope to 1, which might increase risk because of the appearance that a protection mechanism is present when actually it is not.
CVE-2019-15326
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before 1.14.2.1 for WordPress has directory traversal.
CVE-2019-15327
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before 1.14.1.3 for WordPress has XSS via imported data.
CVE-2019-15328
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before 1.14.0.3 for WordPress has XSS.