Feeds

US teen pleads guilty over Scientology DDoS attacks

Anonymous botnet hacktivist faces spell behind bars

High performance access to file storage

A US teenager has admitted involvement in a high profile denial of service attack against Scientology websites last year.

Dmitriy Guzner of Verona, New Jersey, 19, pleaded guilty on Monday to charges of using a botnet of compromised PCs in order to flood Church of Scientology-related websites with spurious traffic back in January 2008. Guzner faces between 12 and 18 months at a sentencing hearing, due to take place on 24 August.

Guzner identified himself among the members of the Anonymous group which has been actively protesting against the Church of Scientology since last year, Assistant U.S. Attorney Wesley Hsu told a Newark Court, AP reports. Papers against Guzner were filed last October in a Los Angeles federal court before the case was moved to New Jersey.

Anonymous launched an ongoing campaign against the Church of Scientology in January 2008 after the controversial organisation attempted to pressurise websites into pulling an infamous video of Tom Cruise, taken at an earlier church awards event.

Tactics used since have moved on from nuisance phone calls to Church of Scientology premises and denial of service attacks to monthly, peaceful protests outside Church facilities. Members of loosely-affiliated group are known for wearing Guy Fawkes-style masks during protests.

Guzner is the first member of Anonymous to be charged over the DDoS attacks. It's unclear how the authorities tracked down Guzner or whether he was implicated in other incidents of cybercrime beyond attempts to blitz Church of Scientology websites. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.