Feeds

Web scam-busting trio thwarted by mystery DDoS rocket

Backhanded compliment for fraud alert sites

Next gen security for virtualised datacentres

Updated A bunch of anti-scam sites was knocked offline last week by fierce and apparently well-organised distributed denial of service attacks.

The sites - 419eater.com, scamwarners.com and aa419.org (Artists Against 419) - were swamped with junk traffic for several days. During the attack the sites' administrators turned to blogs, Facebook and other alternative channels to distribute news of newly detected fake payment sites and other urgent anti-fraud information.

"These websites and their users provide excellent exposure for online fraud activities and have been responsible for allowing thousands of prospective victims to detect a scam in play, and get out before losses are incurred," an anonymous reader who was among those who told us about the attacks explained. "They also work actively to kill fake bank sites, fake freight forwarding sites and other criminal resources."

419eater.com and scamwarners.com were back operating normally by Monday morning while aa419.org remains sluggish the load.

The identities of the perpetrators is unclear. Scammers angry at the activities of the sites in exposing their swindles are the obvious prime suspects behind the DDoS assaults. One reader suggested that recent publicity against a range of fake Amazon sites might have prompted the attacks, but this remains unconfirmed.

We've contacted the sites concerned and will update this story with more information when El Reg hears more.

An automated message received after we contacted the scam-warners confirmed that a DDoS attack had taken place against the site. "Please note that our forum is currently unavailable due to a DDoS attack," the message said. "We hope to resume normal functioning soon. Meanwhile, we are glad to help via email." ®

Bootnote

ScamWarners.com has been in touch to say the attack started against its last Wednesday and went on for several days, adding that a Russian scammer is suspected as the culprit:

The attack was perpetrated by a scammer who became angry at a topic posted on 419Eater, which exposed his scam. 419Eater.com was first attacked and ScamWarners began to publicise it via Twitter and Facebook. The next day [Thursday], ScamWarners was also attacked. The scammer then sent an email to me, threatening both ScamWarners and 419Eater. We were told to cease exposing their information and reporting their Amazon sites or we would both be eradicated from cyberspace.

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.