[OPLIN 4cast] OPLIN 4cast #421: Inside the Dark Side
Editor
editor at oplin.org
Wed Jan 21 10:30:26 EST 2015
Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
OPLIN 4Cast
OPLIN 4cast #421: Inside the Dark Side
January 21st, 2015
lizardThree months ago we posted a 4cast
<http://www.oplin.org/4cast/?p=4966> about the availability of cheap
Distributed Denial of Service (DDoS) attacks on the Internet, mentioning
as well that OPLIN has a system in place to protect libraries from such
attacks. Over the Christmas holidays, DDoS attacks on the Xbox Live and
PlayStation networks got a lot of attention in the media, and shortly
after that the "Lizard Squad" group that claimed credit for those
attacks announced the availability of their own inexpensive DDoS service
for hire. Now, thanks in large part to security researcher Brian Krebs,
that service is falling apart and providing an interesting glimpse into
the dark side of the Internet.
* Lizard kids: A long trail of fail
<http://krebsonsecurity.com/2014/12/lizard-kids-a-long-trail-of-fail/>
(Krebs on Security | Brian Krebs) "The Lizard kids only ceased their
attack against Sony's Playstation and Microsoft's Xbox Live networks
last week after MegaUpload founder Kim Dotcom offered the group
$300,000 worth of vouchers
<http://krebsonsecurity.com/wp-content/uploads/2014/12/lyYRjQB.jpg>
for his service in exchange for ending the assault. And in a
development probably that shocks no one, the gang's members
cynically told Dailydot
<http://www.dailydot.com/crime/lizard-squad-lizard-stresser-ddos-service-psn-xbox-live-sony-microsoft/>
that both attacks were just elaborate commercials for and a run-up
to this DDoS-for-hire offering. The group is advertising the new
'booter service' via its Twitter account, which has some 132,000+
followers. Subscriptions range from $5.99 per month for the ability
to knock a target offline for 100 seconds at a time, to $129.99
monthly for DDoS attacks lasting more than eight hours."
* A hacked DDoS-on-demand site offers a look into mind of "booter"
users
<http://arstechnica.com/security/2015/01/a-hacked-ddos-on-demand-site-offers-a-look-into-mind-of-booter-users/>
(Ars Technica | Sean Gallagher) "Things have not gone all that well
for LizardSquad since the launch of LizardStresser. Shortly after
the service-which uses a botnet of hacked home and institutional
routers-was launched, members of LizardSquad started getting
arrested. Last week the LizardStresser server was hacked, and its
database was dumped and posted to Mega by the former operator of the
darknet 'doxing' site Doxbin. As a result, the usernames and
passwords of LizardSquad's 'customers,' along with logs of the
Internet addresses that had been attacked by the router botnet, were
laid bare for everyone to see."
* Xbox Live destroyers Lizard Squad facing backlash in underground
hacker wars
<http://www.forbes.com/sites/thomasbrewster/2015/01/20/lizard-squad-backlash/>
(Forbes | Thomas Fox-Brewster) "Investigative journalist Brian Krebs
broke the news that the Lizard Stresser Distributed Denial of
Service (DDoS) offering, which lets people pay for website takedowns
and which the Christmas attacks were supposed to advertise, was
breached and the customer database leaked. /Forbes/ has obtained a
copy of what appears to be a leaked Lizard Stresser database, though
it differs from the one Krebs posted a screenshot of (incredibly,
Lizard Squad has been making DMCA requests for links to the leaks to
be taken down from Kim Dotcom's Mega storage service). The link came
courtesy of one of the more talkative dark web denizens who goes by
the name of 'nachash', who once ran the controversial Doxbin site,
where personal details of select individuals were posted on the
anonymising Tor network."
* Lizard Squad's LizardStresser hacked and customer details made
public
<http://www.theguardian.com/technology/2015/jan/19/lizard-squad-lizardstresser-site-hacked>
(The Guardian | Stuart Dredge) "The news follows several arrests
made as police investigate the original PlayStation Network and Xbox
Live attacks. On 31 December, a 22 year-old man from Twickenham was
arrested by the South East Regional Organised Crime Unit
<http://www.theguardian.com/technology/2015/jan/01/man-linked-to-lizard-squad-hack-arrested-over-2013-14-cyber-fraud>
(SEROCU) on suspicion of fraud by false representation and Computer
Misuse Act offences, before being released on bail until 10 March.
Then, on 16 January, an 18 year-old man was arrested in Southport
<http://www.theguardian.com/technology/2015/jan/16/man-held-over-lizard-squad-cyberattacks-on-psn-and-xbox-live>
on suspicion of unauthorised access to computer material,
unauthorised access with intent to commit further offences, and
threats to kill."
*/Articles from Ohio Web Library <http://ohioweblibrary.org>:/*
* How do booters work? Inside a DDoS for hire attack.
<http://web.b.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=85eea67d-654b-47f4-bb41-dd28618478f9%40sessionmgr113&vid=0&hid=115&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=cph&AN=89867465>
(/eWeek/, 8/5/2013 | Sean Michael Kerner)
* This is Lizard Squad, the nebulous hacker group now tied to the Sony
hack.
<http://web.b.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=865a2399-fff6-497c-9816-76a22ece4132%40sessionmgr115&vid=0&hid=115&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=ulh&AN=100128985>
(/Christian Science Monitor/, 12/24/2014 | Fruzsina Eördögh)
* As gaming servers went down, hacker group's profile rose.
<http://web.b.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=7470707c-05ba-4f10-9a46-edd3730a2d93%40sessionmgr114&vid=0&hid=115&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bwh&AN=wapo.909fcc3c-8d35-11e4-a085-34e9b9f09a58>
(/The Washington Post/, 12/27/2014 | Brian Fung and Andrea Peterson)
------------------------------------------------------------------------
The */OPLIN 4cast/* is a weekly compilation of recent headlines, topics,
and trends that could impact public libraries. You can subscribe to it
in a variety of ways, such as:
* *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
subscribing to the following URL:
http://www.oplin.org/4cast/index.php/?feed=rss2.
* *Live Bookmark.* If you're using the Firefox web browser, you can go
to the 4cast website (http://www.oplin.org/4cast/) and click on the
orange "radio wave" icon on the right side of the address bar. In
Internet Explorer 7, click on the same icon to view or subscribe to
the 4cast RSS feed.
* *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
http://mail.oplin.org/mailman/listinfo/OPLIN4cast.
OPLIN 4Cast
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20150121/afb140d9/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: kubrickheader.jpg
Type: image/jpeg
Size: 38379 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20150121/afb140d9/attachment-0003.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: lizard.png
Type: image/png
Size: 18541 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20150121/afb140d9/attachment-0003.png>
More information about the OPLIN4cast
mailing list