Feeds

Face of Mankind DoS teen perp reprimanded

Stupid boy

Reducing security risks from open source software

A UK teenager who admitted launching a denial of service attack on online multiplayer game Face Of Mankind has been reprimanded by police.

The 16-year-old, who can't be named for legal reasons, launched the relatively unsophisticated SYN Flood attack throughout May 2007. As a result, Face Of Mankind's portal was regularly unavailable during the assault.

A police investigation led by Scotland Yard's Computer Crime Unit led to the arrest of the computer studies student in London in October 2007. He admitted responsibility, stating that he and his friends launched the attack after deciding to "take down" the forum over dissatisfaction about the way it was been run. The teenagers co-ordinated their attack on MSN instant messenger.

During the attacks, the teenager logged into the forum and switched over to "invisible" mode, naively thinking this would hide his actions from the site's administrator. These actions led to his undoing, allowing technicians from network analysis and forensics firm Synerity Systems to track down his location in the UK, prior to handing over the case the detectives from Scotland Yard. Synerity Systems was hired by game publishers Ojom to look into the attacks.

Jasper Bongertz explained that the bulletin boards affected by the attack played an integral part of the game: "The bulletin boards were flooded with requests for pages, causing them to go down.

"After we placed a sniffer in front of the servers we found that the attack were coming from one single IP. The same IP was included in the user list for the bulletin board, which gave us an email address. The suspect email address was tied to a subscription to the game which gave us a name and address.

"The attacker was pretty stupid," Bongertz added.

Before it introduced subscription Face Of Mankind boasted 10,000 users. At the time of the attacks it had about 1,500 users. The assaults made the game virtually unplayable and its user base drifted away. Ojom, the publisher of the game, has since taken it down in the face of further assaults which proved more difficult to track down.

"The later attacks were by more professional people using botnets. Finally the game was stopped because those attacks cost money," Bongertz told El Reg. Developers are trying to resurrect the game.

Face Of Mankind's portal is based in Germany. The teenager involved in the attack was read the riot act by police on 24 December but details of the assault, and how he was tracked down, have only just emerged. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.