DDoS attacks can also be served on demand

Source: Internet
Author: User
Keywords DDoS attacks network security
Tags .mall address bitcoin ddos ddos attack ddos attacks demand distributed

The notorious LizardSquad hacker team has hacked into the web site of its own on-demand DDos attacks, and hackers have leaked a lot of confidential information about the site LizardStresser. From the database leaked from the on-demand DDoS attack site, the site has distributed denial of service (DDoS) attacks on targets by collecting cash or Bitcoin. It can be clearly said that the most of the objects of the site services are not clean. In order to find out who is using paid DDoS attacks, what to do, foreign media arstechnica this database analysis. LizardSquad Hacker team's paid DDoS attack website LizardStresser.

Both the previously exposed Booter Web site and the LizardStresser of LizardSquad's station provide a service for paying DDoS attacks on a target, and these sites will attack by disguising the attack as a legitimate load test. LizardStresser was founded by the recently renowned hacker team LizardSquad. The hacker group, which used DDoS attacks on Microsoft's Xbox Live and Sony's PSN network during Christmas last year, has left many players unable to entertain for long periods of time, and this has become an advertisement for LizardSquad to advertise its own DDoS service.

Since then, a great part of LizardStresser's services have been used to attack gamers. While a large percentage of consumer-initiated DDoS attacks are targeted at Web servers, a large portion is targeted at individual or small community game servers, such as Minecraft servers.

However, the progress has not been smooth since lizardstresser was online. Since LizardStresser, they have started to use home routers and corporate router vulnerabilities to provide attack services, and many members of the organization were arrested after the police. Last week, LizardStresser's services were hacked, and their databases were pulled out of the Mega's network.

Everyone is free to download, lizardstresser the customer's username and password, including the Web address log all exposed. Whether you believe it or not, LizardSquad uses the Millennium Digital Copyright Act to force the Mega network tray to line up the files. However, a lot of people have already downloaded the database files, and now these users can be viewed by people's data, is also a certain attack.

Another potential problem is the messy user IP address. To prevent users from sharing their accounts with others, LizardStresser checks whether the current IP address of the account is the same as the IP address at the time of registration. But just a little bit of knowledge of the password, you can crack these MD5 hash encrypted IP address. By decrypting, we see that LizardStresser has provided thousands of DDoS attacks over the past one months.

Muddy

There are close to 13,000 registered users on the LizardStresser website, of which only 250 users pay for DDoS attack services. Most paid users only launched a short-term attack of less than 20 times, with only 30 users launching more than 100 attacks. LizardStresser service is also unfriendly, from the log, the vast majority of users do not know how to operate, will not buy, let alone after the sale.

In the log, the most common message is "the problem of a warrant", "This is a message from the system automatically sent, because you obviously did not read the FAQ, so we stopped using your warrants, please read carefully after the new warrants, this message will not be shown again." (This is a automated response from our ticket system to dour so we have closed your ticket without response as you obviously haven ' t read the FAQ, in the future to read it unreported opening a ticket and this won't happen recycle.) "

Another message from the user:

Hello, members of the Lizard team.

I've heard on Twitter that your attacking chickens are all hacked into routers. So I have an idea that I plan to infect thousands of of users with my own malware in the near future. I know that one thousand or two thousand people may not be able to increase the amount of power, but can I help you infect some people? You may be wondering why I'm willing to help you? All right...... I personally like to watch the lively, I plan to continue to do, so why not help my DDoS service provider.

Thank you for your reply.

LizardSquad Hacker Team reply:

Are you retarded, if we want a chicken, do you really need to help us? Why should you be involved in something we can handle ourselves?

Minecraft is not spared.

The attacks launched by LizardStresser are largely not targeted at large Web sites. Most Web attacks are targeted at small host servers, but we find that most of them are under cloudflare protection. One user has conducted 1468 attacks on a small San Francisco host through LizardStresser services.

This user attacks 20 websites altogether, is lizardstresser most loyal user, has accounted for LizardStresser all attack service quantity 1/5. Ironically, his username is Ryanbrogan, the name of the FBI agent responsible for cybercrime. Brogan has been involved in the 2013 Linode Mainframe was investigated by cyber attacks.

After our statistics, LizardStresser has conducted 16,000 DDoS attacks, with a target of 3,900 IP addresses, since its inception. 67% of the targeted objects are WEB servers (mostly HTTP 80 and 8080 port attacks, and a small number of HTTPS 443-port attacks). The second is the attack on the Minecraft server, which occupies 7% of the total number of attacks. The third is the "Shared domain account Service" Plesk Control Panel attacks, accounting for 5.5%. LizardStresser customers have also attempted to attack DNS and File Transfer Protocol services.

ArsTechnica's correspondent, who contacted the server company, which had been attacked 1468 times, said: "We have been attacked", but last month there was no particularly noteworthy DDoS attack.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.