Skip to main content

Bitcoin Ransom

DDoS extortion is certainly not a new trick by the hacker community, but there have been several new developments to it. Notable among them is the use of Bitcoin as a method of payment. DD4BC (DDoS for Bitcoin) is a hacker (or hacker group) who has been found to extort victims with DdoS attacks, demanding payment via Bitcoin. DD4BC seems to focus on the gaming and payment processing industries that use Bitcoin.

In November 2014, reports emerged of the group having sent a note to the Bitalo Bitcoin exchange demanding 1 Bitcoin in return for helping the site enhance its protection against DDoS attacks. At the same time, DD4BC executed a small-scale attack to demonstrate the exchange vulnerability to this method of disruption. Bitalo ultimately refused to pay the ransom, however. Instead, the site publicly accused the group of blackmail and extortion as well as created a bounty of more than USD $25,000 for information regarding the identities of those behind DD4BC.

The plots have several common characteristics. During these extortion acts, the hacker:

Launches an initial DDoS attack (ranging from a few minutes to a few hours) to prove the hacker is able to compromise the website of the victim.

Demands payment via Bitcoin while suggesting they are actually helping the site by pointing out their vulnerability to DdoS

Threatens more virulent attacks in the future

Threatens a higher ransom as the attacks progress (pay up now or pay more later)

Unprotected sites can be taken down by these attacks. A recent study by Arbor Networks concluded that a vast majority of DD4BCs actual attacks have been UDP Amplification attacks, exploiting vulnerable UDP Protocols such as NTP and SSDP. In the spectrum of cyber-attacks, UDP flooding via botnet is a relatively simple, blunt attack that simply overwhelms a network with unwanted UDP traffic. These attacks are not technically complex and are made easier with rented botnets, booters, and scripts.

The typical pattern for the DD4BC gang is to launch DDoS attacks targeting layer 3 and 4, but if this does not have the desired effect, they will/can move it to layer 7, with various types of loopback attacks with post/get requests. The initial attack typically lies on a scale between 10-20GBps. This is rather massive, but often not even close to the real threat.

If a company fails to meet their requests, and if that company does not migrate this attack through various anti-DDoS services, the group will typically move on after 24 hours of a sustained attack. But you should not count on this pattern to manage your cyber security tactics.




Source by Kanishk Tagade

Popular posts from this blog

Commoditizing the world

Let's discuss commodities; With the latest Enron situation, it is important to understand the way things work. A commodity is anything useful, especially a transportable agricultural product or mining product. This comes from the Latin word "commoditas" meaning roughly advantage, convenience. So then what is a commodity? Well we consider Gold, Silver, wheat, corn, pork bellies, coffee, etc all commodities. If you look in the back of the WSJ or Investors Business Daily you will see a listing of all the commodities traded on the commodities exchange. Enron made some errors no doubt, but let's not judge all commodity markets in haste. Commodity trading works best when there is a stable instrument of trade. Sometimes the instrument of trade is actually the commodity. If you looked most countries of the world today you would find that there are three basic instruments of trade; money, as in currency, precious metals and gems, drugs; like cocaine, opium, and

6 Incredible Benefits Of the Cryptocurrency

Over the past few years, people have been talking a lot about cryptocurrency. At first, this business sounded scary but people started developing trust in it. You may have heard of Ether and Bitcoin. They both are crypto currencies and use the Blockchain Technology for highest security possible. Nowadays, these currencies are available in several types. Let's know more about it. How Can cryptocurrency help you? As far as fraud is concerned, this type of currency can't be faked as it's in digital form and can't be reversed or counterfeited unlike the credit cards. Immediate settlement Buying real property involves third parties, such as lawyers and notary. So, delays can occur and extra costs may incur. On the other hand, Bitcoin contracts are designed and enforced in order to include or exclude third parties. The transactions are quick and settlements can be made instantly. Lower fees Typically, there is no transaction fee if you want to exchange Bitcoin or any other cu

Combining Forex Trading With Gold Trading

Combining forex trading with gold trading can be highly lucrative. If you have been following gold prices, you must know that gold prices have reached their historical peak in the recent times. Gold prices recently broke the historical barrier of $ 1,000 per ounce and now hovering around $ 1,150 per ounce. Market is anticipating a US Dollar depreciation. Whenever, the markets become jittery, investors start buying gold as a hedge against the US Dollar. Last year, after the stock market crash, many investors started investing in gold as a safe haven against the turmoil in the financial markets. Gold and US Dollar have an inverse correlation relationship. Gold and US Dollar are almost near perfect mirror image of each other. US Dollar depreciation during the global financial uncertainty has been the primary reason for the gold appreciation as it is viewed as the ultimate form of money. Gold is also seen as the primary safe haven commodity. Countries like China, Russia and I