Bitcoin Forum
April 25, 2024, 01:38:13 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: DDOS for ransom  (Read 4823 times)
adamstgBit
Legendary
*
Offline Offline

Activity: 1904
Merit: 1037


Trusted Bitcoiner


View Profile WWW
September 19, 2012, 12:09:14 AM
 #41

No one should ever pay a DDOS ransom. Eventually you can quell the attack with multiple solutions. DDOS is unsustainable and is a US Felony.

mining pools were DDOS for ransom back in the day. they just moved to a host that provided DDOS protection.

1714009093
Hero Member
*
Offline Offline

Posts: 1714009093

View Profile Personal Message (Offline)

Ignore
1714009093
Reply with quote  #2

1714009093
Report to moderator
Unlike traditional banking where clients have only a few account numbers, with Bitcoin people can create an unlimited number of accounts (addresses). This can be used to easily track payments, and it improves anonymity.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Kris
Donator
Hero Member
*
Offline Offline

Activity: 640
Merit: 500


View Profile
September 19, 2012, 12:14:46 AM
Last edit: September 19, 2012, 12:28:26 AM by Kris
 #42

I just think it's such a shame, that you have to hide behind all sorts of protection, even when you run a descend business in which people depend on to put food on their table.

On another site i have read that they use cloudflare resolver to figure the real ip. I could gather such a tool if youre interested, however, could be a fake soft tough.

Thank you for bringing this to my attention. It seems I made the correct choice of building my own solution based on amazon ec2 implementation and applying custom firewall rules to prevent this DDoS.

My only regret is that I did not foresee the size of this attack as it caught me totally off guard.
ErnestoJuarell
Member
**
Offline Offline

Activity: 113
Merit: 10


¿Sabe lo que quiero decir?


View Profile
September 19, 2012, 12:38:40 AM
 #43

I just think it's such a shame, that you have to hide behind all sorts of protection, even when you run a descend business in which people depend on to put food on their table.

On another site i have read that they use cloudflare resolver to figure the real ip. I could gather such a tool if youre interested, however, could be a fake soft tough.

Thank you for bringing this to my attention. It seems I made the correct choice of building my own solution based on amazon ec2 implementation and applying custom firewall rules to prevent this DDoS.

My only regret is that I did not foresee the size of this attack as it caught me totally off guard.
Any chance you could publish a blacklist?

fm1234
Member
**
Offline Offline

Activity: 68
Merit: 10


View Profile
September 19, 2012, 12:45:18 AM
 #44

Assassination Market

The first time some chronic DDoSer, whether an extortionist, "political activist" or idiot script kiddie is found slashed from his groin to his solar plexus, 90%+ of people who have ever launched even a single attack will go find a new hobby.  

Been saying this for 15+ years about malevolent hackers; while society itself seems inclined to give them a free pass, I think that the fact that despite huge leaps in technology, no group has ever taken on a serious criminal organisation speaks volumes about what their real level of confidence against reprisals is.  


Frank
Desolator
Sr. Member
****
Offline Offline

Activity: 392
Merit: 250



View Profile
September 19, 2012, 05:07:50 AM
 #45

3 pages later, I bet this has been posted but tl;dr.  DDOS = a lot of PCs.  If they control them, couldn't they just use them all for mining instead of targeting them at a server for extortion? Tongue
ErnestoJuarell
Member
**
Offline Offline

Activity: 113
Merit: 10


¿Sabe lo que quiero decir?


View Profile
September 19, 2012, 05:22:04 AM
 #46

3 pages later, I bet this has been posted but tl;dr.  DDOS = a lot of PCs.  If they control them, couldn't they just use them all for mining instead of targeting them at a server for extortion? Tongue
CPU Mining is so worthless, even with a botnet of average PCs. You could make way more money by DDOSing or just stealing user info. There's already been Bitcoin mining botnets discovered.

Also, mining may slow the PCs down more which could potentially reveal to the user that they are infected or even drive them to get rid of the infection.

WikileaksDude
Hero Member
*****
Offline Offline

Activity: 490
Merit: 500



View Profile
September 19, 2012, 10:33:11 PM
 #47

3 pages later, I bet this has been posted but tl;dr.  DDOS = a lot of PCs.  If they control them, couldn't they just use them all for mining instead of targeting them at a server for extortion? Tongue
CPU Mining is so worthless, even with a botnet of average PCs. You could make way more money by DDOSing or just stealing user info. There's already been Bitcoin mining botnets discovered.

Also, mining may slow the PCs down more which could potentially reveal to the user that they are infected or even drive them to get rid of the infection.

This is true, even using botnets to mine its not worth the time. DDOS and identity theaft much more profitable.
Vladimir
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1001


-


View Profile
September 19, 2012, 11:41:17 PM
 #48

We do not negotiate with DDOS attackers. Simple really.

-
paraipan
In memoriam
Legendary
*
Offline Offline

Activity: 924
Merit: 1004


Firstbits: 1pirata


View Profile WWW
September 20, 2012, 12:15:34 AM
 #49

Prolexic has it covered...


BTCitcoin: An Idea Worth Saving - Q&A with bitcoins on rugatu.com - Check my rep
Desolator
Sr. Member
****
Offline Offline

Activity: 392
Merit: 250



View Profile
September 20, 2012, 04:29:23 PM
 #50

How do people stop DDOS attacks anyway?  Is it like a separate box or proxy laid down in the chain of connected stuff that auto-ignores requests from any IP sending way too many requests at a much faster speed than the server could or something?
capsqrl
Sr. Member
****
Offline Offline

Activity: 444
Merit: 250



View Profile
September 20, 2012, 06:05:45 PM
 #51

BitPay is back from their DDOS now. Any information on whether they paid their way out, and if so, how much?

Norsk Bitcoin-bruker? Kom til /r/BitcoinNO på reddit!
jgarzik
Legendary
*
Offline Offline

Activity: 1596
Merit: 1091


View Profile
September 20, 2012, 08:52:34 PM
 #52

How do people stop DDOS attacks anyway?  Is it like a separate box or proxy laid down in the chain of connected stuff that auto-ignores requests from any IP sending way too many requests at a much faster speed than the server could or something?

A lot of little strategies, rather than one big obvious fix.  DDoS typically involves flooding of some type of traffic.  A simple DDoS might be a flood of TCP/IP open-a-new-connection packets, designed to confuse and overload OS kernel networking software.  Other DDoS's are simply a massive amount of valid traffic, i.e. sending HTTP requests to compute-intensive script on the web server, over and over again, hundreds of thousands of requests per second.

Each DDoS is different.  The traffic sources may come from different parts of the world, originate from different ISPs.  They may originate from a criminal DDoS black market, where armies of "zombie" machines may be rented by the hour to perform DDoS attacks.

One thing is certain, though:  there is very little economic reason to pay DDoS ransoms, as that simply serves as a clear economic signal that you are a mark, and can possibly be taken for even more money.  Paying ransoms encourages further DDoS.  Criminal parasites don't need your business to be profitable and sustainable.

Typically a business will take unspecified technical steps themselves, or hire a security firm or DDoS-proof hosting firm to do it for them.

Sometimes it is possible wait out a DDoS, but that's not realistic for most web businesses/services.  It could take weeks or months, as the cost of zombies is probably below the several-thousand-bitcoin payout that other thieves have seen in the bitcoin press headlines.


Jeff Garzik, Bloq CEO, former bitcoin core dev team; opinions are my own.
Visit bloq.com / metronome.io
Donations / tip jar: 1BrufViLKnSWtuWGkryPsKsxonV2NQ7Tcj
hashman
Legendary
*
Offline Offline

Activity: 1264
Merit: 1008


View Profile
September 20, 2012, 09:53:15 PM
 #53

Ridiculous.  Walletbit? 
I thought gambling sites were always the best targets for would-be DDOS extortion thugs.
 
Kris
Donator
Hero Member
*
Offline Offline

Activity: 640
Merit: 500


View Profile
September 22, 2012, 02:39:44 AM
 #54

I just think it's such a shame, that you have to hide behind all sorts of protection, even when you run a descend business in which people depend on to put food on their table.

On another site i have read that they use cloudflare resolver to figure the real ip. I could gather such a tool if youre interested, however, could be a fake soft tough.

Thank you for bringing this to my attention. It seems I made the correct choice of building my own solution based on amazon ec2 implementation and applying custom firewall rules to prevent this DDoS.

My only regret is that I did not foresee the size of this attack as it caught me totally off guard.
Any chance you could publish a blacklist?

Sorry, I don't store much logs because of people wanting to be anonymous. So they are probably already overwritten. The important thing is that the service was running again after only 48 hours from Saturday to Monday, while still being DDoS'd
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!