Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 5 of 5
Like Tree3Likes
  • 3 Post By whiteLight

Thread: BTCC Bitcoin Trader Confronts DDoS Attackers Like A Pro

  1. #1
    It's Alright,You Heard?
    whiteLight's Avatar
    Reputation Points
    214616
    Reputation Power
    100
    Join Date
    Aug 2014
    Posts
    9,269
    Time Online
    462 d 3 h 45 m
    Avg. Time Online
    3 h 7 m
    Mentioned
    2378 Post(s)
    Quoted
    807 Post(s)
    Liked
    12475 times
    Feedbacks
    440 (100%)

    BTCC Bitcoin Trader Confronts DDoS Attackers Like A Pro

    BITCOIN-FOR-DDOS EXTORTION SCHEME HAS A NEW VICTIM AND ITS NONE OTHER THAN THE BTCC — HOWEVER, THE HACKER WAS UNFORTUNATE THIS TIME AS THE COMPANY WAS CAPABLE FINANCIALLY AND HAD IMPLEMENTED ADVANCED DDOSPROTECTION MEASURES BEFOREHAND.

    On 31st December, the first of the series of DDoS attacks on BTCC, a renowned Bitcoin trader company, took place, reports Crypto Currency News service. After the attack ended, the firm received a ransom email from an unknown source.

    The company was warned for more such attacks if they refuse to pay 1 Bitcoin (equal to $425) in ransom.

    On 1st January 2016, the DDoS assaults continued and this time, a 10 Gbps attack was launched. Such an enormous attack wasn’t expected by the company’s DDoS mitigation service but BTCC quickly implemented a better protection plan, according to this Reddit post.

    The second attack was followed by a hike in ransom demand by the hacker and a payment of 10 Bitcoin ($4250) was required now. The firm, however, decided to invest in advanced and well-protected servers than paying the ransom, yet again.

    As a result, BTCC’s service lost partial functionality and another email was sent by the hacker. The ransom note read:

    “We will keep these attacks up until you pay! The price is now 30 BTC. You had better pay up before you go bankrupt! Mwa ha ha!”
    The Bitcoin trader firm continued to upgrade its servers and ignored the demands.

    The attacks resumed but this time, no downtime was registered at BTCC.

    The attacker finally admitted defeat and sent this email:

    “Hey, guys, look, I’m really a nice person. I don’t want to put you all out of business. What do you say we just make it 0.5 BTC and call it even?” This email was also ignored by BTCC, which prompted this response from the hacker:

    “Do you even speak English?” and the blackmailing stopped..

    In November 2015, an encrypted email provider ProtonMail paid a ransom of about $6000 in order to stop them from DDoSing its servers. However, the payment didn’t really stop the criminals from attacking the service.

    In the past, one of the assistant special agents from the Federal Bureau of Investigation (FBI) Joseph Bonavolonta was noted saying that it’s completely fine to pay ransom to cyber criminals.

    “The ransomware is that good,” and that “to be honest, we often advise people just to pay the ransom,” according to Bonavolonta.
    DGM, RickC1337 and TheTrader like this.

  2. #2
    User Qui Peccavit's Avatar
    Reputation Points
    140
    Reputation Power
    32
    Join Date
    Dec 2015
    Posts
    34
    Time Online
    19 h 51 m
    Avg. Time Online
    N/A
    Mentioned
    2 Post(s)
    Quoted
    1 Post(s)
    Liked
    27 times
    Feedbacks
    3 (100%)
    The police advise people to pay ransom? Yeah, that is SURELY the best incentive to make criminals stop.

    Maybe, it would be better to train the police to do their work, counter and capture those [*!###] instead of telling people to throw the towel.

  3. #3
    User nross1978's Avatar
    Reputation Points
    110
    Reputation Power
    32
    Join Date
    Jan 2016
    Posts
    32
    Time Online
    13 h 57 m
    Avg. Time Online
    N/A
    Mentioned
    5 Post(s)
    Quoted
    2 Post(s)
    Liked
    4 times
    Feedbacks
    0
    The way I see it is, if you give in once they will know that you are a easy target if enough pressure is applied, So why pay up?

  4. #4
    Extreme User
    CC1x's Avatar
    Reputation Points
    14266
    Reputation Power
    100
    Join Date
    Mar 2015
    Posts
    505
    Time Online
    51 d 6 h 38 m
    Avg. Time Online
    22 m
    Mentioned
    223 Post(s)
    Quoted
    75 Post(s)
    Liked
    419 times
    Feedbacks
    110 (100%)
    Quote Originally Posted by nross1978 View Post
    The way I see it is, if you give in once they will know that you are a easy target if enough pressure is applied, So why pay up?
    Yes that is true, what happened to Protonmail was that they were attacked by DDoS attack by a group, paid the ransom then two other groups stared attacking " these subsequent attacks have reached 40-50 Gbps" demanding much higher ransom. which Protonmail refused to pay instead they added DDoS protection to ProtonMail. And no more attackers
    Last edited by CC1x; 01-10-2016 at 04:07 AM.

  5. #5
    User nross1978's Avatar
    Reputation Points
    110
    Reputation Power
    32
    Join Date
    Jan 2016
    Posts
    32
    Time Online
    13 h 57 m
    Avg. Time Online
    N/A
    Mentioned
    5 Post(s)
    Quoted
    2 Post(s)
    Liked
    4 times
    Feedbacks
    0
    Yes I bet they are just added to the 'suckers list' equivalent for large targets, if they pay
    Last edited by nross1978; 01-10-2016 at 11:57 PM.


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •