Inside The Trojan Horse Business

rated by 0 users
This post has 2 Replies | 0 Followers

Top 10 Contributor
Posts 26,172
Points 1,185,755
Joined: Sep 2007
ForumsAdministrator
News Posted: Mon, Dec 17 2007 8:48 AM

In late November, the Justice Department announced that they'd lived our dream: they got their hands on eight people that had infected unsuspecting computer users with Trojan Horse applications. InfoWorld profiled each of the perps, and it's fascinating to see the various ways they committed their crimes -- and the reasons they said they did it. Those range from plain old larceny to perceived slights on message boards. Look at bot-herder Gregory King:


The owners of the Web sites that the 21-year-old King harassed alleged in court filings that he engaged in a campaign of harassment, intimidation, threats, and finally massive DDoS attacks. Using the online monikers Silenz and GregK to taunt his victims in brazen online posts of threats and links to porn sites in IRC chat channels and message boards, he launched repeated attacks on Killanet, a Web site aimed at children and teenagers, dating back to June 2004 and continuing through October 2006. According to published news reports, King's motivation was revenge for perceived slights.


King had no interest in subtlety or in masking where his attacks originated from, and reportedly even dropped hints as to his real-life identity. He controlled his botnet from his parents' home in Fairfield, Calif., as well as from a nearby library, a McDonalds, and from a Best Buy store near his home.


In February 2007, King used his botnet to DDoS the servers used by Castlecops for five continuous days. The motivation for the attack: Castlecops moderators had deleted or modified some of King's more vitriolic posts to the message board. "If you edit my post once more, you will be sorry," King wrote in a post on February 13th. Four minutes later he was banned from the message board. That night, King launched his attack.

Talk about your Internet cliche. A denial of sevice attack launched from your mother's basement over a message board insult. I bet the Justice Department didn't even have to dust for fingerprints on his keyboard, they probably just took impressions from the Cheetos dust left on the keys.



  • | Post Points: 35
Top 200 Contributor
Posts 412
Points 5,250
Joined: Apr 2007
Location: United States, Maryland
Lev_Astov replied on Mon, Dec 17 2007 10:05 AM
Wow, you sure are right they lived our dreams! I think they should hand this sort of thing over to the DoD and treat these people like terrorists once they've learned what they need to know from them.

><((((">Lev Astov

  • | Post Points: 5
Top 500 Contributor
Posts 150
Points 2,250
Joined: Sep 2007
Location: U.S.
mazuki replied on Mon, Dec 17 2007 6:44 PM
knowledge should be distributed freely, but the people that have access should be restricted.
  • | Post Points: 5
Page 1 of 1 (3 items) | RSS