DDoS attacks = not cool.
Brit hacker hired by Liberian telco to nobble rival now behind bars
A Surrey man has been jailed for 32 months after admitting to launching distributed denial-of-service (DDoS) attacks against an African telco. Daniel Kaye, 30, of Egham, told the Blackfriars Crown Court that back in 2016 he took a monthly salary from Liberian company Cellcom to carry out a sustained DDoS against their rival …
COMMENTS
-
-
-
-
Monday 14th January 2019 18:21 GMT DropBear
Re: highly skilled hacker
Huh...? What "vulnerabilities" ?!? Krebs: "In late 2016, the world witnessed the sheer disruptive power of Mirai, a powerful botnet strain fueled by Internet of Things (IoT) devices like DVRs and IP cameras that were put online with factory-default passwords and other poor security settings."
-
-
Tuesday 15th January 2019 02:18 GMT doublelayer
Re: highly skilled hacker
In constructing that malware, there was some work finding holes into the systems. Usually, the default passwords were helpful, but a lot of devices that were supposed to have things like web interfaces limited to local subnets or devices behind NATs and thus harder to find had security holes that nonetheless allowed access. UPNP was a major culprit here, though not in the least the only one.
-
-
-
-
-
Monday 14th January 2019 07:40 GMT macjules
Charged with creating a botnet?
Kaye was arrested in February of 2017 and pled guilty last month to counts of creating and using a botnet and possessing criminal property.
Perhaps, "pleaded guilty last month to several charges under Section 3 of the Computer Misuse Act 1990: unauthorised acts with intent to impair the operation of a computer, plus possessing criminal property." might be more appropriate?
-
-
Monday 14th January 2019 11:52 GMT Tom 38
Re: "..with no consideration as to the damage it would cause"
Quote is accurate. He was hired by Cellcom to make their competitor Lonestar look bad. He hadn't anticipated that his actions would overwhelm all connections to Liberia - so not just making Lonestar look bad, but knocking everyone in Liberia out - including Cellcom.
-
-
Monday 14th January 2019 08:29 GMT lglethal
Sentences for white collar crimes really are soft
If a thief broke into a house and stole a Rembrandt worth a few million or lets say some bank robbers broke into a bank after hours and stole a few million from the safe. Without violence or much in the way of property damage, they would still be looking at 5-10 years hard time minimum. This guy from the safety of his own home caused millions of dollars in damage to a telco, inconvenienced hundreds of thousands of customers, took down the internet for an entire country, AND is implicated in similar attacks on other firms (including banks) and he gets less than 3 years.
I guess the lesson is, If you're going to be a criminal, be a white collar ciminal...
-
Monday 14th January 2019 17:27 GMT Alan Brown
Re: Sentences for white collar crimes really are soft
"This guy from the safety of his own home caused millions of dollars in damage to a telco, inconvenienced hundreds of thousands of customers, took down the internet for an entire country, AND is implicated in similar attacks on other firms (including banks) and he gets less than 3 years."
It was only BECAUSE of the telcos and banks that law enforcement took an interest.
He and his friends have been knocking smaller hosters offline with DDoS attacks for years for commercial gain without so much as an eyelid being batted. This is why companies like Akamai have been able to make a fortune in providing DDoS protection services.
It's only when the companies being affected are large enough to have political clout that cages start to be rattled.
-
Monday 14th January 2019 18:16 GMT c1ue
Re: Sentences for white collar crimes really are soft
Yes, but the comment doesn't go far enough.
This fellow isn't very smart because white collar crime in the form of market rigging, front running, other bankster tactics would yield millions in his own pocket rather than just millions of damages and tens of thousands in pocket.
-
Tuesday 15th January 2019 09:34 GMT LucreLout
Re: Sentences for white collar crimes really are soft
Without violence or much in the way of property damage, they would still be looking at 5-10 years hard time minimum.
You overestimate the importance of violence to the criminal justice system. If you assualt someone serious enough that you break their nose, plead guilty to a single punch and have no previous criminal record, you WILL walk out of court with only a suspended tariff to enjoy.
-
-
Monday 14th January 2019 10:24 GMT Alan Brown
He was hiring the attack net OUT
Not renting it IN.
FFS the BBC article on this was more in depth and accurate overall than the bolloxed pile of fetid dingo kidneys that's been posted on El Reg.
https://www.bbc.co.uk/news/uk-46840461 - also goes into more depth about the german charges
https://www.bbc.co.uk/news/uk-england-surrey-41115800
https://www.telegraph.co.uk/news/2019/01/11/briton-knocked-entire-country-offline-cyber-attack-jailed/
In any case, he was a skiddie not a hacker.
https://www.zdnet.com/article/hacker-bestbuy-sentenced-to-prison-for-operating-mirai-ddos-botnet/
-
Monday 14th January 2019 10:35 GMT Doctor Syntax
Re: He was hiring the attack net OUT
The two are not incompatible. This article says that he rented infected devices from others to bulk out his net. That's a detail not in the Beeb's report (which, BTW, isn't even by one of the their tech reporters). It wouldn't be the first time that a report by el Reg has more information on technical matters than the BBC.
-
Monday 14th January 2019 10:47 GMT Alan Brown
Re: He was hiring the attack net OUT
Nope. One of the other Beeb articles on the goings on at Blackfriars stated charges related to a number of other DDoS attacks were dropped because they were attributed to him hiring the DDoS net out to 3rd parties (Why that would let him off the hook I don't know either)
He was bulking things out all by himself - it was the scanning for more victims to add to his botnet which caused the outages at TalkTalk, Postoffice and Deutsche Telekom when he knocked over vulnerable enduser routers on those networks
https://krebsonsecurity.com/2017/07/who-is-the-govrat-author-and-mirai-botmaster-bestbuy/
https://krebsonsecurity.com/tag/daniel-kaye/
Contrary to claims he's not the first person to knock entire countries off air. It was quite easy for IRC skiddies to do it in the 90s when a lot of places were only on 128/256kb/s links - and a fairly regular occurance. Interestingly the people concerned had Israeli skiddie connections back then too.
-
-
-
Monday 14th January 2019 11:28 GMT Wellyboot
Do the Liberians want him for Trial?
If I'm correct here - He was convicted here for operating a botnet for payment from within the UK, Not for the events covered by the separate German case or the specific Liberian DDoS, these will just be used as evidence for the activities he actually conducted here.
If he'd been implicated with a DDoS in the USA I'd expect extradition papers to be served as he steps out of the prison front door.
Lots of separate jurisdictions with individual cases to answer patiently waiting their turn, no different to a jewel thief being implicated in robberies in several different countries.
-
Monday 14th January 2019 11:55 GMT Anonymous Coward
What Kaye did
"If I'm correct here - He was convicted here for operating a botnet for payment from within the UK, Not for the events covered by the separate German case or the specific Liberian DDoS, these will just be used as evidence for the activities he actually conducted here."
No, you are wrong. The botnet was run from Cyprus. He was tried in Germany - and pleaded guilty - for the collateral damage in Germany caused by his efforts. He was tried in the UK for the Cyprus >> Liberia activity because sections 4 and 5 of the Computer Misuse Act 1990 gave the UK courts jurisdiction.
What some see as a relatively modest sentence reflects the fact that he pleaded guilty at a very early stage - in fact the German courts said he was fully co-operative and it was German police work that the NCA relied on.
NCA also investigated whether Kaye was responsible for DDoS attacks and associated extortion demands on UK banks - but these charges were withdrawn before trial.
-
Monday 14th January 2019 13:59 GMT Alan Brown
Re: What Kaye did
"but these charges were withdrawn before trial"
These were the parts where he rented his botnets out to 3rd parties.
At 28, he knew damned well what he was doing. My dealings with IRC skiddies showed that they either grew out of it by 15-16 or became habitual criminals - and one who was covered in El Reg in the early 2000s over a number of court appearances popped his head above my radar recently - showing that leopards don't change their spots despite accruing convictions and supposedly being very sorry for what they did.
-
Monday 14th January 2019 13:35 GMT Anonymous Coward
Bandwidth!
"That botnet, referred to as "#14" by researchers, was among the largest on the internet"
Ouch, now consider the collateral cost in bandwidth to anyone whose network was traversed by groups of bots participating in these attacks.
"Kaye was a talented and sophisticated cyber criminal who created one of the world's largest networks of compromised computers which he then made available to other cyber criminals with no consideration as to the damage it would cause," said Russell Tyner from the UK Crown Prosecution Service (CPS)
Yeah, thanks for big-upping this asshole's ego.
-
Monday 14th January 2019 17:36 GMT Mark 85
Re: Bandwidth!
Yeah, thanks for big-upping this asshole's ego.
I think that's a side effect of the plod and the prosecutor's self-ego enhancing statement. All prosecutor's seem to do this as if to show that they are smarter than the crims and to justify their time on the case. It also hides the fact that most of them have little clue about all things computer related.
IOW, it's bluster for the masses.
-
-
-
Monday 14th January 2019 23:52 GMT John Savard
Re: Others to Be Found
I did a search. Apparently one rogue employee at Cellcom had hired him. During the time when this was happening, Cellcom got bought out by a reputable European company, Orange.
Whether this rogue employee faced any consequences yet, though, I haven't found out.
But the rival telecom that was the intended victim has launched a civil suit against Cellcom - and this suit was launched in UK courts, not Liberian ones.
-
Tuesday 15th January 2019 15:56 GMT TheGriz
Corporate Culpability???
. . . he took a monthly salary from Liberian company Cellcom to carry out a sustained DDoS against their rival telco Lonestar . . .
What (if any) penalty does the adversary telecom Cellcom that hired the bloak get? That is a more interesting story in my opinion, if he was being PAID by them, they are the real guilty party here. Not trying to pardon the hacker wanna be, but he was hired and paid by one teleco to attack their competition, which in my own personal opinion is much more devious than some script kiddie DDOS'ing them for kicks or Internetz Fame.
Heads should roll at Cellcom, from the top down, based on how much their corporate management KNEW about them hiring a hacker for nefarious deeds.