Cyber attacks by the DDoS gang

Cyber attacks by the DDoS gang

Since April of 2015, there have been discussions about the cyber attacks by the DDoS gang. They are called the DD4BC group and they are responsible for 114 attacks by DDoS on Akamai customers. Akamai is a leading content delivery network (CDN) for the delivery of media and software, and cloud security solutions which gives businesses fast, reliable, and secure Internet service. The DDoS group tries to extort money from successful companies which depend on the Internet. They threaten to knock their internet presence out with major DDoS (denial of service attacks).

The group started during September of 2014. Their biggest attack was more than 56.2 gbps of online traffic. They hit their peak in June of 2015 and were hitting more targets than they were in previous months. Those initiating the threats send huge volumes of unimportant traffic to their targets to overwhelm their systems. This is all in the attempts to knock out websites or make them inaccessible to others from outside the company.

How do they work this? They first contact their target and explain they will have a lower level of the DDoS threats if they pay a ransom by a certain time. If the target ignores the communication or email of the proposed threat, larger attacks would be threatened and the targets are requested to pay even larger ransoms.

This group is very dangerous and they are destroying companies. They continue to increase the amount of threats and continue to target major companies with the hopes of greater gains. 


What's Hottest

New FAA drone regulations

With the purpose of keeping the standard of having the safest and most complex airspace in the world, the Department of Transportation’s Federal Aviation Administration released in August a series of regulations for the lawful use of unmanned aircraft systems (UAS) or “drones”.…

Companies to Block Extremist Videos

While companies are silent on whether rumors over the use of technology to automatically delete extremist content from their sites, it has been confirmed that they have met with the Counter Extremism Project (CEP) to adopt similar measures that Google, Microsoft, and Internet Service Providers used…

Japan abandons lost satellite

Astro-H satellite, also known as “Hitomi”, was a satellite sent by Japan´s space agency on February 17 to study black holes. The idea was primarily to study X-rays emitted by them. However, on March 26, contact with the satellite was lost. This brought all Japanese most brilliant…

Malvertisers use digital fingerprints

If you’ve ever owned a PC, odds are pretty good that at some point you’ve been a victim of malvertising. This is when you visit a website, and it installs a program onto your computer. Often, this happens without the user being aware of it. As many of us have experienced, these programs…

What is Bot Fraud?

Fraud is an issue in our modern society that we just cannot escape. Many people know of identity theft, online scams, and other measures of deception online, but what is bot fraud? Can robots really be fraudulent? Yes, robots can be created to steal identities online and pose many other threats to…

What is cellphone spyware & who uses it?

As the word itself suggests, cellphone spyware or spy software is precisely that: spying on a target phone in such a way that a person can have access to practically all cellphone activity. Now, it sounds like NSA would have access to all your activity and completely strip us of our privacy. This is…

Spot Light

China’s Tesla autopilot crash caused by the words “zidong jiashi”

Another controversy for Tesla’s autopilot - another crash was reported in China. The accident is the first recorded in China and occurred months after a terrible crash in Florida. These events have added pressure on regulators and auto industry executives to tighten up regulations on autopilot…

Read More

News Flash