Florida man charged in 2004 attack on Akamai
He allegedly helped launch a DDoS attack on Akamai's systems
Computerworld - A 32-year-old Florida man has been charged with hacking into computer systems at two major universities and helping to launch a distributed denial-of-service (DDoS) attack on servers managed by Cambridge, Mass.-based Akamai Technologies Inc.
According to U.S. Attorney Michael Sullivan, John Bombard of Seminole, Fla., was charged yesterday with two counts of intentionally accessing a protected computer without authorization. If convicted, he would face up to two years in prison followed by one year of supervised release and a $200,000 fine on each charge, according to the U.S. attorney's office.
Akamai spokesman Jeff Young said the company couldn't comment on the matter because the charges were still pending.
Akamai distributes online content and business processes over a network of computer servers. On June 14, 2004, it suffered a significant increase in Web traffic to a number of its Domain Name System (DNS) servers, Sullivan said in a statement. That increase in traffic was caused by the DDoS attack against Akamai's global traffic management servers, which served many customers. Access to the Web sites of those customers was slowed and in some cases completely blocked by the attack.
According to the statement, the attack against Akamai's infrastructure allegedly originated from a bot network that received its instructions from a series of computers, including ones located at two major universities, the identities of which have not been made public.
Bombard is accused of compromising those computer systems using a variant of the Gaobot worm and then allegedly directing communication from the university computers to the bot network from a computer located on his domain, "f0r.org."
The case was investigated by the FBI before the charges against Bombard were filed.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts