Akamai is known for helping enterprises provide secure, high-performing user experiences. The company recently released a case study about distributed denial of service (DDoS) attacks from the Bitcoin extortionist group DD4BC, based on attack traffic targeting it’s customers.
Attack traffic from DD4BC (DDoS for Bitcoin) began in September 2014. Since April 2015, the Akamai team and it’s partners identified that 114 DD4BC attacks had taken place, and more aggressive measures are being employed. DD4BC now threatens to expose a targeted organization via social media, in addition to the damage caused by the DDoS attack itself.
“DD4BC has been using the threat of DDoS attacks to secure Bitcoin payments from its victims for protection against future attacks,” said Stuart Scholly, Senior Vice President General Manager, Security Division at Akamai. “The latest attacks – focused primarily on the financial service industry – involved new strategies and tactics intended to harass, extort and ultimately embarrass the victim publically.”
Victims of the attacks receive emails from varying addresses, and the type of email received depends on the targeted organisations level of DDoS security. “Please note that it will not be easy to mitigate our attack. because our current UDP flood power is 400 – 500 Gbps, so don’t even bother. At least, don’t expect cheap services like CloudFlare of Incapsula to help… but you can try. :)” DD4BC states in some of the emails.
“We do bad things, but we keep our word.”
The group continues to advise their targets that small demonstrative attacks were being run, but not hard enough to crash the site. “It’s just to prove that we are serious. Check UDP traffic. :)”
The groups first campaign stands as the highest bandwidth DDoS attack confirmed as DD4BC thus far. The 56Gbps generated
Originally appeared at: http://bravenewcoin.com/news/dd4bc-expands-extortion-campaigns-for-bitcoin/