Feeds

One-minute Koch-blocking earns attacker two years, massive fine

Low Orbit Ion Cannon claims another victim

High performance access to file storage

A Wisconsin man has been sentenced to two years of probation and a fine of $183,000 after pleading guilty to taking part in an Anonymous DDoS attack against the servers of Koch Industries for one minute.

Eric Rosol, 38, pleaded guilty to one misdemeanor count of accessing a protected computer by downloading the Low Orbit Ion Cannon tool propagated by hacking collective Anonymous and using it to attack the Kochind.com website. His involvement lasted one minute before he closed down the software, but investigators were able to backtrace his IP address and bring charges.

The attack took place in February 2011 after Anonymous called for action against Koch Industries, the private company owned by Charles and David Koch. The brothers' funding of right wing and libertarian groups attracted the ire of Anonymous, but the attack only took down the website for around 15 minutes.

Koch Industries acknowledged that the attack caused them less than $5,000 in direct monetary damages but said it hired a consulting firm to defend its website at a cost of $183,000, a bill which Mr. Rosol will now be ordered to pay.

The case is yet another where the deficiencies of the Low Orbit Ion Cannon have led to the arrest of users. The tool, which Anonymous promoted as a way to take activism online, has been mitigated in many respects as an attack tool and it now seems the authorities are getting better at back tracing it, even if it is only used for very short periods of time. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.