
Those botnets contain tens of thousands of computers compromised by malware. Technically speaking, those who launch these DDoS attacks aren’t hackers, given how little technical skill is required.Īll they have to do is harness the horsepower provided by botnets, as Sophos’s Mark Stockley noted at the time of the vDOS takedown. Tens of thousands of customers’ details were spilled, along with the identities of its teenage owners. VDOS was taken down in September, and its alleged co-owners were arrested following a “massive hack” on the site. Interestingly, the very same thing happened recently to vDOS, one of the most disruptive attack-for-hire services on the internet. Remember Lizard Squad? They ruined Christmas 2014 with a DDoS directed at PlayStation and Xbox servers, timed to make sure nobody could play games during the holiday.Ī spot of poetic justice was had when the Lizard Stresser service itself got hacked, spilling customer details on to the internet. According to The Register, Mudd’s creation was the basis for Lizard Stresser, a DDoS tool marketed by the hacking group. One of Mudd’s satisfied customers must have been the hacking group Lizard Squad. In fact, it was, for a time, the most popular DDoS-for-hire service available online. Those attacks were launched against 181 IP addresses between December 2013 and March 2015, the month that Mudd was arrested and the service was shut down.Īccording to Silicon Angle, Mudd kept detailed logs of all the attacks that relied on Titanium Stressor. Investigators determined that Mudd’s stressor – which is a tool used to flood networks with data, bogging them down until they’re dead in the water, non-functioning and vulnerable to compromise – was used in more than 1.7 million DDoS attacks worldwide. Investigators are still working out the total amount Mudd made from the attacks, but their preliminary estimate is around $385,000.


He also sold it online and ran it as a service, distributing it to cyber crooks. He didn’t just use it to launch his own DDoS attacks. A 19-year-old UK teenager from Hertfordshire has pleaded guilty to creating and running the Titanium Stresser booter service, with which he launched 594 denial of service (DDoS) attacks.Īccording to a statement put out by the Bedfordshire Police, Adam Mudd developed the tool when he was just 15 years old.
