Prolific hacker imprisoned for facilitating millions of DDoS attacks

Prolific hacker imprisoned for facilitating millions of DDoS attacks

sergiy usatyuk

Sergiy Usatyuk, a 21-year-old hacker, has been sentenced to 13 months in prison in the U.S. for owning, administering and supporting illegal booter services that launched millions of DDoS attacks on computer systems in the U.S. and in other countries.

The sentencing was carried out by the U.S. District Court for the Eastern District of North Carolina who also ordered Sergiy Usatyuk to forfeit $542,925 and to hand over dozens of servers and other computer equipment that were used to sdminister booter services and launch a number of DDoS attacks.

"Usatyuk combined with a co-conspirator to develop, control and operate a number of booter services and booter-related websites from around August 2015 through November 2017 that launched millions of DDoS attacks that disrupted the internet connections of targeted victim computers, rendered targeted websites slow or inaccessible, and interrupted normal business operations," said the U.S. Department of Justice.

Sergiy Usatyuk was arrested by U.S. authorities in March this year for running as many as eight DDoS booter services which were used by other hackers to launch 3,829,812 DDoS attacks between 2015 and 2017.

He ran several DDoS booter services such as ExoStress.in, QuezStresser.com, Betabooter.com, Databooter.com, Instabooter.com, Polystress.com, Zstress.net, and Decafestresser aside from a couple of booter-affiliated websites Bestipstressers.com and Ipstressers.org that promoted the booters online and also advertised other booter services.

Sergiy Usatyuk ran multiple DDoS booter services as a teenager

The DDoS booter services run by Usatyuk and a Canadian co-conspirator were immensely popular on hacker forums, so much so that Exostresser alone was used to carry out as many as 1,367,610 DDoS attacks on organisations, inflicting over 4,500 days of downtime on targeted organisations.

Usatyuk earned over $550,000 and 10.74 Bitcoin by offering such DDoS booter services for hire over a 27-month period and he also exploited third-party "amplification servers" without their owners' consent to amplify unauthorised web traffic against targeted organisations.

"This sentence demonstrates the FBI’s continuous commitment to unmasking malicious actors behind these type of egregious cyberattacks. By calling out those criminals who hide behind their computer and launch attacks, the FBI is sending a strong message that we will work tirelessly with our law enforcement partners to investigate and hold all criminals accountable, no matter what weapon they use to terrorize others,” said Special Agent in Charge John Strong of the FBI’s North Carolina Field Office.

Following Usatyuk's sentencing, Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division said that Usatyuk made hundreds of thousands of dollars by launching countless indiscriminate cyber-attacks that victimized various segments of American society.

"The Criminal Division and our law enforcement partners will remain vigilant in protecting the American public from these types of sophisticated, far-reaching threats," he added.

Copyright Lyonsdown Limited 2021

Top Articles

teissTalk: Cyber Policy & Supply Chain Resilience

On 15 April, teissTalk host Geoff White was joined by a panel of four cyber security experts to discuss keeping supply chains cyber secure and resilient.

teissTalk: Malicious or Non-Malicious? Tackling the Remote Insider Threat

On 13 April, teissTalk host Jenny Radcliffe was joined by a panel of four cybersecurity professionals to discuss insider threats, especially the threat posed by remote workers.

Meet the teissTalk Hosts - The state of cyber crime in 2021

Social engineer Jenny Radcliffe and investigative journalist Geoff White, the joint hosts of teissTalk, introduce themselves

Related Articles