'Anonymous' arrests tied to PayPal DDoS attacks, FBI says
14 arrested for PayPal attacks, two others for 'related' cybercrimes
Computerworld - The FBI said this afternoon that it had arrested a total of 14 people thought to belong to the hacking group known as Anonymous for their alleged participation in a series of distributed denial-of-service (DDoS) attacks against PayPal last year.
The defendants, all of whom are in their 20s or early 30s, were arrested on no-bail arrest warrants in a series of raids in Alabama, California, Colorado, the District of Columbia, Massachusetts and five other states. All of them were charged in an indictment that was unsealed in federal court in San Jose today.
Two other individuals were also arrested today on what the FBI said in a statement were related cybercrime charges.
One of them, Scott Matthew Arciszewski, 21, was arrested in Florida on charges that he illegally accessed files from a Tampa Bay InfraGard website last year and then publicly posted information telling others how to break into the site.
The other indictment unsealed in federal court in New Jersey charged Lance Moore, 21, of Las Cruces, N.M., with stealing protected business information from an AT&T server in June this year, and posting it on a public file hosting site. The thousands of documents, applications and files that Moore is alleged to have stolen were later made publicly available by the LulzSec hacking group, the FBI said in the statement.
According to the San Jose indictment, the 14 individuals who were arrested today were all members of Anonymous who conspired to attack PayPal last December in retaliation for its perceived opposition to WikiLeaks.
Soon after the whistleblower site started publicly releasing classified U.S. State Department cables late last November, PayPal terminated an account that WikiLeaks had set up to collect donations, citing violations of its terms of service.
The move prompted a series of angry retaliatory DDoS attacks against PayPal by members of the Anonymous hacking collective. Similar attacks were carried out by Anonymous members against the sites of several other companies that were seen as opposing WikiLeaks.
The attacks, dubbed "Operation Avenge Assange," were coordinated by Anonymous using an open-source tool called Low Orbit Ion Cannon that the group made available for public download to anyone who wanted to participate.
The 14 individuals named in today's indictment in San Jose have each been charged with conspiring to cause damage to a protected computer and intentionally causing damage to a protected computer. The conspiracy charge carries a maximum of five years in prison and a $250,000 fine, while the intentional damage charge carries a maximum penalty of 10 years in prison and a $500,000 charge, the FBI noted in its statement.
The individuals named in the San Jose indictment are Christopher Cooper, 23, Joshua Covelli, 26, Keith Downey, 26, Mercedes Haefer, 20, Donald Husband, 29, Vincent Kershaw, 27, Ethan Miles, 33, James Murphy, 36, Drew Phillips, 26, Jeffrey Puglisi, 28, Daniel Sullivan, 22, Tracy Valenzuela, 42 and Christopher Quang Vo, 22. One individual was unnamed.
The raids come amid a recent spike in activity by Anonymous. Just last week, members of the group claimed credit for breaking into computers belonging to military contractor Booz Allen Hamilton and exposing the email addresses and passwords of more than 90,000 military personnel.
Earlier this month, Anonymous was labeled a cyberterrorism group by the Arizona Department of Public Safety after members of the group repeatedly attacked Arizona police union websites to protest the state's tough immigration laws. In December, Anonymous launched a series of DDoS attacks against several organizations, including PayPal and Amazon.com, to protest what it claimed were efforts to stifle whistleblower site WikiLeaks.
Today's FBI raids shouldn't come as a surprise, said Josh Shaul, CTO of security vendor Application Security Inc. "They got a lot of people angry," he said. "When you play with fire you are going to get burned."
What is unusual, however, is that some Anonymous members appeared to have put little effort into concealing their tracks, according to Shaul. "It seems like these folks who got caught were brazen and careless about the way they went about their hacking activity," he said.
Many of the recent attacks by Anonymous and splinter group LulzSec appear to be focused on embarrassing the victims, not on outright data theft or sabotage. Even so, Shaul said that law enforcement officials "are certainly going to want to make an example of anyone they can bring in."
- Kicking the stool out from under the cybercrime economy
- Chinese man indicted over theft of Boeing C-17 secrets
- The making of a cybercrime market
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts