Florida man charged in 2004 attack on Akamai
He allegedly helped launch a DDoS attack on Akamai's systems
Computerworld - A 32-year-old Florida man has been charged with hacking into computer systems at two major universities and helping to launch a distributed denial-of-service (DDoS) attack on servers managed by Cambridge, Mass.-based Akamai Technologies Inc.
According to U.S. Attorney Michael Sullivan, John Bombard of Seminole, Fla., was charged yesterday with two counts of intentionally accessing a protected computer without authorization. If convicted, he would face up to two years in prison followed by one year of supervised release and a $200,000 fine on each charge, according to the U.S. attorney's office.
Akamai spokesman Jeff Young said the company couldn't comment on the matter because the charges were still pending.
Akamai distributes online content and business processes over a network of computer servers. On June 14, 2004, it suffered a significant increase in Web traffic to a number of its Domain Name System (DNS) servers, Sullivan said in a statement. That increase in traffic was caused by the DDoS attack against Akamai's global traffic management servers, which served many customers. Access to the Web sites of those customers was slowed and in some cases completely blocked by the attack.
According to the statement, the attack against Akamai's infrastructure allegedly originated from a bot network that received its instructions from a series of computers, including ones located at two major universities, the identities of which have not been made public.
Bombard is accused of compromising those computer systems using a variant of the Gaobot worm and then allegedly directing communication from the university computers to the bot network from a computer located on his domain, "f0r.org."
The case was investigated by the FBI before the charges against Bombard were filed.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts