Language Selection

English French German Italian Portuguese Spanish

Denial of service attack victim speaks out

Filed under
Security

he founder of an online payment system has spoken to silicon.com about his experience of being targeted by Russian gangsters who threatened to destroy his website and his business if he didn't pay them $10,000 to leave him alone.

To this day his website is under continual attack.

Asif Malik, founder of NoChex, said his first contact with these hackmailers was in August 2004 when he received an email saying his website would be taken down by a denial of service attack if the money wasn't paid into an account based in Latvia.

"We'd received loads of emails like this before and my initial reaction was just ignore it," Malik told silicon.com. "But an hour later the site went down. They'd attacked us with 155Mb of data."

Malik was in no doubt what this would mean for his business.

"If they did what they said they'd do, which was attack the site for 30 days continuously, then we would have been unable to process transactions and we would have lost all our merchants.

"We'd not be in business today," he added.

Such an attack, often generated by a network of compromised machines all directing traffic at a particular server or website, will overload and bring down a website.

Malik then contacted the Russian gangsters behind the extortion scam and asked for one day to get the money together. They agreed to the delay and stopped the attack.

However, during that time Malik contacted his ISP Pipex who were already threatening to "black hole" his website as the attack was impacting the whole Pipex network and asked them to implement a Cisco Guard solution which effectively rerouted all traffic and cleaned it of the malicious traffic being generated by the crippling denial of service.

"The next morning they were emailing asking 'where is our money?'. When they realised we weren't going to pay-up they launched another attack but this time it had no effect."

Predictably this did not go down well. Malik received a string of abusive and threatening emails.

And to this day the attacks continue - though they have little impact on the NoChex website.

"I think they are still looking for a new way in," said Malik. Though he now employs several penetration testing companies to continually check he's leaving no door open for the Russian extortionists to return.

Malik reported the attack to Scotland Yard but as yet has heard nothing of the ongoing investigation.

Many other victims of such attacks, most commonly targeted at businesses such as online casinos, bookmakers and payment services, whose businesses are very time sensitive, have also spoken out about their problems.

Full Story.

More in Tux Machines

Today in Techrights

today's leftovers

  • LinuXatUSIL – Previas 2 for #LinuxPlaya
    Damian from GNOME Argentina explained us some code based on this tutorial and the widgets in Glade were presented.
  • RancherOS v0.8.0 released! [Ed: and a bugfix release, 0.8.1, out today]
    RancherOS v0.8.0 is now available! This release has taken a bit more time than prior versions, as we’ve been laying more groundwork to allow us to do much faster updates, and to release more often.
  • The Technicals For Red Hat, Inc. (RHT) Tell An Interesting Tale
  • Ubuntu 17.04 Beta 1 Released | New Features And Download
    Ubuntu 17.04 Zesty Zapus Beta 1 release is finally here. If you’re interested, you can go ahead and download the ISO images of the participating flavors, which are, Lubuntu, Kubuntu, Xubuntu, Ubuntu Budgie, Ubuntu GNOME, Ubuntu Kylin, and Ubuntu Studio. Powered by Linux kernel 4.10, these releases feature the latest stable versions of their respective desktop environments. This release will be followed by the Final Beta release on March 23 and final release on April 13.
  • Ubuntu 17.04 Beta 1 Now Available to Download
    The first beta releases in the Ubuntu 17.04 development cycle are ready for testing, with Xubuntu, Ubuntu GNOME and Ubuntu Budgie among the flavors taking part.

FOSS Policies

Leftovers: BSD