Bitcoin Forum
September 24, 2018, 12:41:45 PM *
News: ♦♦ New info! Bitcoin Core users absolutely must upgrade to previously-announced 0.16.3 [Torrent]. All Bitcoin users should temporarily trust confirmations slightly less. More info.
 
   Home   Help Search Donate Login Register  
Pages: « 1 2 3 4 [5]  All
  Print  
Author Topic: DDOS Payback  (Read 8113 times)
Zedster
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
April 22, 2013, 04:54:47 PM
 #81

start a rumor that the guy doing the ddos did/said something extremely offensive to islam.  then let al queda behead him.

I like this one. or Make a cartoon of Allah DDoSing the Koran and put the attackers name to it?


On a more serious ignorant note.  Why is not possible to make a virus to disable botnets?  Can viruses (virii?) not be made for good proposes only bad?  This was kinda of discussed earlier in the thread but not exactly.  I would have no idea how to do such a thing but why couldn't a virus be made to disinfect botnet infected machines?  Frustrate the botnet ops like they frustrate those they attack.

1537792905
Hero Member
*
Offline Offline

Posts: 1537792905

View Profile Personal Message (Offline)

Ignore
1537792905
Reply with quote  #2

1537792905
Report to moderator
Einax Airdrops and Bounties made easy! List your ERC-20 token
FREE
ETH markets launching soon!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
moni3z
Hero Member
*****
Offline Offline

Activity: 886
Merit: 1000



View Profile
April 22, 2013, 05:11:35 PM
 #82

If they were seriously planning on dumping the price and making "$300k" in profits afterwards they wouldn't be telling the world beforehand. This is troolin, esp the "one-million botnet" part
mr-sk
Member
**
Offline Offline

Activity: 119
Merit: 10



View Profile
April 22, 2013, 05:28:17 PM
 #83

A real attack wouldn't have leaked ... maybe they are probing to see the community response ... I wouldn't be surprised to see a real attack in the coming days/weeks.

TsuyokuNaritai
Hero Member
*****
Offline Offline

Activity: 574
Merit: 500



View Profile
April 23, 2013, 03:50:39 AM
 #84

If the BTC community can do this over 34 bitcoins...

https://bitcointalk.org/index.php?topic=173227.msg1907593#msg1907593

So how did I find this kid and get the coins? An amazing group of researchers put together valuable information, starting by contacting the file hosting site that hosted the trojan. They got the login and ip info and matched it to a user called PoutineCoutu across the net which has a few scam reports. We then found him highly active on hackforums.net where he was selling and GIVING AWAY bitcoins, which also matched all the activity to the bitcoin address where my coins went. He's so stupid he didn't even wash the coins and was selling them publicly. He even has multiple threads asking how to open ports on his firewall for his trojan C&C and that he is using a silent java drive-by script.

Reported to police (they are really no help, so much for paying their salary, seems they've gotten fbi reports about bitcoins and don't really like them, started asking if I pay taxes on them...), but at least I had a precedent to pursue. Tried contacting the thief, he blocked me and claimed I was blackmailing him all over the forums. This went on for a while. He was feeling the heat and dumped the coins to an offline exchange member, Xch4nge, which I tracked down immediately by tracking the coins on blockchain.info. Contacted him and what an amazing guy, helped me throughout the entire process and took alot of heat but basically a huge skid war erupted all across the forums, and he still held on to the coins for a week until finally the kid came to his senses realizing what he was doing is "bad" (and he might go to jail). He was arguing that it's okay he stole the coins from someone, but not okay someone "stole" the coins from him.

Finally he publicly agreed to allow the return of the coins. Throughout the entire process many people came to my help and provided me information about this person and one guy who goes to school with him even said that he's a $%@!. And the guy who sold him the Java script even apologized to me and said he's sorry that his script was responsible for my loss...

... I wouldn't bet on the DDOSers getting away with it.

The probably easier task of tracking down the pastebin FUDers would also be a good start, and would send a clear message.

flix
Legendary
*
Offline Offline

Activity: 1227
Merit: 1000



View Profile
April 25, 2013, 08:12:20 AM
 #85

Mtgox statement:
https://mtgox.com/pdf/20130424_ddos_statement_and_faq.pdf

Quote
On the evening of April 21st, from 11:50 PM Tokyo time,
Mt. Gox was hit by a strong DDoS (Distributed Denial of Service) attack that caused the
site and trading engine to be unavailable for approximately four hours. The source of the
attack is under investigation, and we are working with appropriate authorities to identify
those responsible. However, the reality is that our primary goal is to stop the attacks and
stabilize the exchange.

Quote
How we are being attacked:
What we are experiencing lately are “Layer 7” DDoS attacks. Unlike your average DDoS
(which overloads the servers with traffic to the site as a whole) these are much more
creative and harder to detect in that they target specific elements of the site and make it
difficult to distinguish malicious traffic from normal traffic. The attackers’ goal is to shut
down the exchange, either through the DDoS itself, or by forcing Mt. Gox to take measures
that have the same effect. Attached to this document (See FAQ below) are some details
from Prolexic regarding the recent attack.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2044
Merit: 1007

Newbie


View Profile
April 25, 2013, 09:02:45 AM
 #86

For 7 BTC someone can order a non-stop DDoS attack for the whole month. (http://areyouaredo.cc/?p=uslugi)
Mylon
Full Member
***
Offline Offline

Activity: 140
Merit: 100

Mining FTW


View Profile
April 25, 2013, 10:07:37 AM
 #87

Strangely enough... all financial institutes have been hit with DDOS in the past couple of weeks, In Holland they are currently still nuking a couple of government services. That they attack bitcoin is only logical, as even while being p2p is still a financial institute (distributed ofc) but this is where it shows the strength and weaknesses of bitcoin. They haven't found a way to disrupt bitcoin itself with DDOS, so they go after the exchanges (an easier target)

All we can do at this moment is stand fast, and hope Gox has their anti-ddos shit together so we have minimal interference. The fact that these people have not been caught, even after nuking just about any bank in the US and Europe, says enough IMO. Either the priority on this is just wrong, or they are very very good and will not be caught. (if some government is behind it... the won't get caught too)


"All Your Base Are Belong To Us" by CATS
Nite69
Sr. Member
****
Offline Offline

Activity: 477
Merit: 500


View Profile
April 27, 2013, 05:22:08 AM
 #88

I have a suggestion to fight against dDOS attacs: Turn the bots against the botnet controller. Ie. instead of DDOS the target, they will DDOS them self :-D


Ok, how to do it? Hard question.. some ideas:

1. analyse the bot and make it forward it attack to the controller (works only specific bots)
2. DDOS attacks usually use faked DNS queries. Make a virus that finds out if PC is sending fake DNS queries. If it is, start sending those queries with different faked sending address from all connections the PC have. This will include also the bot controller. It also jams the pc connections so the user wil react.

Any other ideas?

Sync: ShiSKnx4W6zrp69YEFQyWk5TkpnfKLA8wx
Bitcoin: 17gNvfoD2FDqTfESUxNEmTukGbGVAiJhXp
Litecoin: LhbDew4s9wbV8xeNkrdFcLK5u78APSGLrR
AuroraCoin: AXVoGgYtSVkPv96JLL7CiwcyVvPxXHXRK9
Trongersoll
Hero Member
*****
Offline Offline

Activity: 490
Merit: 500



View Profile
April 27, 2013, 03:24:34 PM
 #89

if we actually knew who was doing it what would be the point of ddosing him back? just post up a bounty for his broken knee caps. say 100btc per cap?

I think finger/hands would be more effective. oh, cut out his tongue to prevent speech to text software from helping him.
Genosx
Full Member
***
Offline Offline

Activity: 406
Merit: 100



View Profile
July 15, 2018, 06:51:20 AM
 #90

Actually in cryptocurrency there are lots of problem and I think that is the problem it faces in payback period.
There are some companies who are really don’t give returns in income that they get.

   SEMUX   -   An innovative high-performance blockchain platform  
▬▬▬▬▬      Powered by Semux BFT consensus algorithm      ▬▬▬▬▬
Github    -    Discord    -    Twitter    -    Telegram    -    Get Free Airdrop Now!
Pages: « 1 2 3 4 [5]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!