Operation Payback: Feds Charge 13 On Anonymous Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Operation Payback: Feds Charge 13 On Anonymous Attacks


Men accused of launching DDoS attacks against MPAA, RIAA, Visa, MasterCard and other organizations perceived to be hostile to piracy sites and WikiLeaks.



Anonymous: 10 Things We Have Learned In 2013 (click image for larger view and for slideshow)
Thirteen men have been charged by a federal grand jury with participating in a series of 2010 and 2011 attacks organized under the banner of the Anonymous hacktivist collective.
A
28-page indictment
, handed down in federal court in Alexandra, Va., charged the men with one count of conspiracy to intentionally cause damage to a protected computer during an online attack campaign that included such targets as the websites of the Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA), the U.S. Copyright Office of the Library of Congress, as well as Visa, MasterCard and Bank of America.
According to the indictment, the attacks were carried out under the banner of
Operation Payback
-- aka Operation: Payback Is A Bitch -- and were first launched to target anti-piracy organizations in the United States, as well as Australia, Britain, France, the Netherlands and other countries. The attacks later expanded to target organizations that were perceived to be hostile to WikiLeaks, such as Visa and MasterCard, which blocked the flow of funds to the whistle-blowing website after it began
posting secret U.S. diplomatic cables
.
[ How far can the FBI go with suspected computer criminals? Read
Stratfor Hacker: FBI Entrapment Shaped My Case
. ]
The Operation Payback attack campaign ran from September 2010 through January 2011. PayPal, which was also targeted -- but not cited in the indictment -- has said it suffered losses of $5.6 million as a result.
The 13 men charged -- along with some of the nicknames the indictment said they used online -- include: Thomas J. Bell, Zhiwei Chen (Jack, TickL), Joshua S. Phy (Anonyjosh), Dennis Owen Collins (iowa, anon5), Geoffrey Kenneth Commander (jake, bipto) Ryan Russell Gubele (grishnav), Jeremy Leroy Heller (heelgea), Timothy Robert McClain, Austen L. Stamm (user_x), Phillip Garrett Simpson (jikbag), Anthony Tadros (Winslow), Robert Audubon Whitfield (mightymooch), and Wade Carl Williams (TheMiNd).
According to the indictment, the men [engaged] in a coordinated series of cyber-attacks against victim websites by flooding those websites with a huge volume of irrelevant Internet traffic with the intent to make the resources on the websites unavailable to customers and users of those websites -- meaning they launched distributed denial-of-service (DDoS) attacks. Williams was also accused of linking to an online site that listed the names, home address and phone number of the Bank of America CEO, as well as his wife, for harassment purposes.
The indictment said all 13 men used the DDoS attack tool known as
Low Orbit Ion Cannon
. The tool was originally distributed to Anonymous members with the promise that it could be used to
launch one-click attacks
against targets of the operators choosing. During Operation Payback, target lists were detailed online -- including on IRC message boards -- so LOIC operators could join in.
Unbeknownst to less technically sophisticated LOIC users, however, was the fact that when the tool generated a stream of packets -- designed, en masse, to
overwhelm a targeted site
-- it would code the IP address of the attackers computer into the packet stream unless the operator proactively disguised their IP address. As a result, PayPal and other attacked organizations were reportedly able to turn over log files that listed the IP addresses that had attacked them. In short order, the FBI began subpoenaing service providers and tying IP addresses to subscribers identities.
These
arent the first charges
to be filed against alleged Operation Payback participants, either in the United States or abroad. British authorities, for example, arrested four men in 2011 on charges of participating in a group called both Nerdo and NikonElite, which targeted digital entertainment industry companies and later participated in Operation Payback attacks.
Three of those men
pleaded guilty
, while the fourth -- Christopher Wetherhead -- was found guilty in Dec. 2012 of one count of conspiracy to commit unauthorized acts with intent to impair the operation of a computer, in violation of Britains 1990 Computer Misuse Act. British investigators said theyd identified the men after
studying Anonymous IRC logs
.
According to some legal experts, British authorities have tended to prosecute the organizers behind the Operation Payback attacks, while U.S. prosecutors have tended to pursue not just the organizers, but anyone who downloaded and used LOIC to join in the attacks.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Operation Payback: Feds Charge 13 On Anonymous Attacks