'Anonymous' arrests tied to PayPal DDoS attacks, FBI says
14 arrested for PayPal attacks, two others for 'related' cybercrimes
Computerworld - The FBI said this afternoon that it had arrested a total of 14 people thought to belong to the hacking group known as Anonymous for their alleged participation in a series of distributed denial-of-service (DDoS) attacks against PayPal last year.
The defendants, all of whom are in their 20s or early 30s, were arrested on no-bail arrest warrants in a series of raids in Alabama, California, Colorado, the District of Columbia, Massachusetts and five other states. All of them were charged in an indictment that was unsealed in federal court in San Jose today.
Two other individuals were also arrested today on what the FBI said in a statement were related cybercrime charges.
One of them, Scott Matthew Arciszewski, 21, was arrested in Florida on charges that he illegally accessed files from a Tampa Bay InfraGard website last year and then publicly posted information telling others how to break into the site.
The other indictment unsealed in federal court in New Jersey charged Lance Moore, 21, of Las Cruces, N.M., with stealing protected business information from an AT&T server in June this year, and posting it on a public file hosting site. The thousands of documents, applications and files that Moore is alleged to have stolen were later made publicly available by the LulzSec hacking group, the FBI said in the statement.
According to the San Jose indictment, the 14 individuals who were arrested today were all members of Anonymous who conspired to attack PayPal last December in retaliation for its perceived opposition to WikiLeaks.
Soon after the whistleblower site started publicly releasing classified U.S. State Department cables late last November, PayPal terminated an account that WikiLeaks had set up to collect donations, citing violations of its terms of service.
The move prompted a series of angry retaliatory DDoS attacks against PayPal by members of the Anonymous hacking collective. Similar attacks were carried out by Anonymous members against the sites of several other companies that were seen as opposing WikiLeaks.
The attacks, dubbed "Operation Avenge Assange," were coordinated by Anonymous using an open-source tool called Low Orbit Ion Cannon that the group made available for public download to anyone who wanted to participate.
The 14 individuals named in today's indictment in San Jose have each been charged with conspiring to cause damage to a protected computer and intentionally causing damage to a protected computer. The conspiracy charge carries a maximum of five years in prison and a $250,000 fine, while the intentional damage charge carries a maximum penalty of 10 years in prison and a $500,000 charge, the FBI noted in its statement.
The individuals named in the San Jose indictment are Christopher Cooper, 23, Joshua Covelli, 26, Keith Downey, 26, Mercedes Haefer, 20, Donald Husband, 29, Vincent Kershaw, 27, Ethan Miles, 33, James Murphy, 36, Drew Phillips, 26, Jeffrey Puglisi, 28, Daniel Sullivan, 22, Tracy Valenzuela, 42 and Christopher Quang Vo, 22. One individual was unnamed.
The raids come amid a recent spike in activity by Anonymous. Just last week, members of the group claimed credit for breaking into computers belonging to military contractor Booz Allen Hamilton and exposing the email addresses and passwords of more than 90,000 military personnel.
Earlier this month, Anonymous was labeled a cyberterrorism group by the Arizona Department of Public Safety after members of the group repeatedly attacked Arizona police union websites to protest the state's tough immigration laws. In December, Anonymous launched a series of DDoS attacks against several organizations, including PayPal and Amazon.com, to protest what it claimed were efforts to stifle whistleblower site WikiLeaks.
Today's FBI raids shouldn't come as a surprise, said Josh Shaul, CTO of security vendor Application Security Inc. "They got a lot of people angry," he said. "When you play with fire you are going to get burned."
What is unusual, however, is that some Anonymous members appeared to have put little effort into concealing their tracks, according to Shaul. "It seems like these folks who got caught were brazen and careless about the way they went about their hacking activity," he said.
Many of the recent attacks by Anonymous and splinter group LulzSec appear to be focused on embarrassing the victims, not on outright data theft or sabotage. Even so, Shaul said that law enforcement officials "are certainly going to want to make an example of anyone they can bring in."
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- QuickPoll: Why hasn't Windows XP come under attack from hackers?
- Cybercrime losses top $400 billion worldwide
- U.S., foreign agents disrupt Gamover Zeus botnet
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts