They say living well is the best revenge, but as so many of us have come to realize, it isnâ€™t exactly satisfying. Even so, most people would agree living well is preferable to, say, living in prison for the sake of revenge, but for one disgruntled ex-employee, it was apparently a trade he was willing to make.
DDoS attacks have long been a go-to for tech-savvy companies willing to get their hands dirty, whether itâ€™s revenge over business went bad or a straight-up strategy for taking underhanded aim at the competition. With how cheap and easy itâ€™s become to use DDoS for hire services, pretty much anyone â€“ tech-savvy or not â€“ can do serious, long-term damage with a devastating cyberattack.
Distributed denial of service or DDoS attacks is perhaps unsurprisingly designed to deny a website’s services to its users. This is accomplished using a botnetâ€™s collection of hijacked internet-connected devices to slam the target websiteâ€™s server or infrastructure with malicious traffic, overwhelming it to the point that itâ€™s too slow to be used or itâ€™s offline altogether.
At one time, launching a DDoS attack required having access to if not writing malware that hijacks those internet-connected devices and having a command and control server for issuing directions to them to hurl malicious traffic at the target website â€“ and thatâ€™s a DDoS attack in its simplest form. There are all kinds of reflection and amplification techniques used to complicate and intensify attacks. Multiple attack vectors can be used, and both the network layer and application layer can be targeted.
In short, launching a distributed denial-of-service attack used to be reserved for people who really really know what theyâ€™re doing with computers, making them potent but at least somewhat rare. That is no longer the case. DDoS for hire services, otherwise known as booters or stressors, rent out the use of a botnet, allowing anyone to essentially type in a URL and hit it with an attack. Prices start at just a few dollars for a short, low-volume burst and go into the hundreds for longer, more powerful assaults, like the kind purchased by our disgruntled ex-employee and soon-to-be current felon.
An employee scorned
In 2015, Washburn Computer Group, a computer system repair firm in Minnesota, began experiencing shutdowns of a number of their websites. Along with these shutdowns, Washburn received emails tauntingly asking if they were experiencing any ongoing IT issues. These emails were somewhat incomprehensibly accompanied by an image of a laughing mouse.
The server log files didnâ€™t reveal much about the culprit thanks to an anonymizing service; those laughing mouse emails left a trail of IP address crumbs that led directly to former Washburn employee John K. Gammell. Gammell had worked for the firm for 17 years. Though he apparently left on good terms, a dispute over payment for training services turned ugly enough that he allegedly enlisted the services of seven booters, spending up to $200 per month on his three favorite booters for a DDoS campaign that lasted a year and four months. In addition to Washburn, Gammell allegedly targeted several banks, several employment contracting services heâ€™d done work for, and the Minnesota Judicial Branch.
Gammell is charged with knowingly causing damage without authorization to a protected computer. He recently rejected a plea deal that would have capped his potential prison sentence at 15-17 years.
A dish best not served
The case against Gammell is the first of its kind in Minnesota. He joins the Lizard Squad ranks, a hacker group that targeted the UKâ€™s National Crime Agencyâ€™s website with a DDoS attack in retaliation for its DDoS arrests for hire users as famous perpetrators of DDoS revenge attacks.
These instances of perpetrators actually being identified have garnered plenty of publicity, but itâ€™s because theyâ€™re so rare. For every John K. Gammell facing prison time, there is an untold number of websites and organizations dealing with these attacks’ these attacks’ crippling effects. In Washburnâ€™s case, Gammellâ€™s attacks cost them approximately $15,000. That estimate probably doesnâ€™t even account for customer loyalty’s long-term damage, especially considering Washburn specializes in computer repairs. Customer frustration and loss of loyalty often end up being the highest cost of a successful DDoS attack amongst costs that can soar to $100,000 for every minute of downtime.
With how easy it is to partake in the services of a booter, and with the ever-increasing size and might of Internet of Things botnets powering some booters, nearly every website on the internet is a potential target, as well as every business with an online presence or connectivity, whether itâ€™s because of revenge-motivated reasons, competition, hacktivism, the draw of social media attention, or random DDoS ransom notes. Meanwhile, thereâ€™s a good possibility there will be important evidence suppressed in the case against Gammell if the charges arenâ€™t dropped altogether because some of the evidence was obtained in a hack of one of the DDoS for hire services, making it the fruit of a poisoned tree. That is the current state of justice in this world of ever-increasing DDoS threats.