Statement on OCG Attack
Comments
-
lionheartban wrote: »Not sure why this thread is still up, you'll never catch the person doing it nor will you ever acquire the proof to make a case. You don't have the money to hire a legal team or even one single lawyer.2fastSTREAK wrote: »Well that's not good.
We indeed do have the money to seek a lawyer, as we have 3 partners in this company. If we pursue that route, that is our choice. I have been constantly watching this guy, use his botnets... Saying that there was a botnet attack with POST requests to our forum. I managed to block around 160 IPs, which stopped the attack for a good amount of time, but then it continued. I have decided to let the attack go through for the night, shutting down all the important servers. The issue will be stopped and fixed by the end of the week.
Thanks,
Evan
OCG President -
-
The person is using a botnet, which alone, is illegal as he/she's accessing people's computers without authorization, and using them in his/her attacks.
Just an outline of the penalties of computer hacking from Connecticut laws because Google is awesome:
http://www.cga.ct.gov/2012/rpt/2012-R-0254.htm
What he/she has done applies to many of the listed acts.
oh never knew that -
lionheartban wrote: »DDoS/DoS falls under cyber crimes. At least in international law it does, not sure about US laws.
I'm pretty sure the person attacking OCG isn't stupid enough to use a botnet.
What's so stupid about using a botnet? A botnet is the strongest way of the average joe to attack anything right now. Shielding yourself behind other people's computers, and using them to your advantage is stupid? I would have never had guessed. Slaya. -
Doesnt matter if an attack was directed towards OCG, 1 single person, or the FBI, its still against that law to do such attacks.
Now as for laws go, if the attacker is in a country that those laws have no affect in, then nothing can be done. But if that country does have such laws, then fines/jail time will be stated. (Correct me if I'm wrong) -
What's so stupid about using a botnet? A botnet is the strongest way of the average joe to attack anything right now. Shielding yourself behind other people's computers, and using them to your advantage is stupid? I would have never had guessed. Slaya.
Botnets are easily traceable and anyone who uses one to attack a company is a moron. That's what I was getting at. -
LANJPurvis wrote: »Doesnt matter if an attack was directed towards OCG, 1 single person, or the FBI, its still against that law to do such attacks.
Now as for laws go, if the attacker is in a country that those laws have no affect in, then nothing can be done. But if that country does have such laws, then fines/jail time will be stated. (Correct me if I'm wrong)
You're wrong. -
-
lionheartban wrote: »Botnets are easily traceable and anyone who uses one to attack a company is a moron. That's what I was getting at.
"Just like botnets, DDOS attacks have become stealthier and tougher to trace than ever, with layers of bot armies disguising the original source. 'Tracing a DDOS is a particularly vexing problem, with the whole notion of obfuscation and onion routing [techniques],' says Steve Bannerman, vice president of marketing and product management for Narus."
http://www.darkreading.com/perimeter/how-to-trace-a-ddos-attack/208804763
Ok.AwfulFallout wrote: »a server with the proper hack tool -
"Just like botnets, DDOS attacks have become stealthier and tougher to trace than ever, with layers of bot armies disguising the original source. 'Tracing a DDOS is a particularly vexing problem, with the whole notion of obfuscation and onion routing [techniques],' says Steve Bannerman, vice president of marketing and product management for Narus."
http://www.darkreading.com/perimeter/how-to-trace-a-ddos-attack/208804763
Ok.
wat.
i dunno, knew some kid in high school he was caught by the FBI DDoS stuff, they didn't do anything to him however, but some of the stuff he used he showed me when he brought laptop to school, he mostly shut down CP sites and Islamic sites using a server to sustain an attack because using other people's IPs would make it easier to get caught some how, the tool he used was a pre-made tool from a hacker off the deep web -
LANJPurvis wrote: »What do you know about this? I would like to know myself.
Assuming said person is in another country or another continent, that's where international law is in effect. There's actually no law in effect with specific regard to DDoS/DoS attacks, unless you're a massive company with major backing the likeliness of a case going to court is very slim to none. -
lionheartban wrote: »Assuming said person is in another country or another continent, that's where international law is in effect. There's actually no law in effect with specific regard to DDoS/DoS attacks, unless you're a massive company with major backing the likeliness of a case going to court is very slim to none.
That's what I was saying.
Just because someone attacked a US based company and broke the law doesn't mean it applies to the home county of the attacker. -
AwfulFallout wrote: »i dunno, knew some kid in high school he was caught by the FBI DDoS stuff, they didn't do anything to him however, but some of the stuff he used he showed me when he brought laptop to school, he mostly shut down CP sites and Islamic sites using a server to sustain an attack because using other people's IPs would make it easier to get caught some how, the tool he used was a pre-made tool from a hacker off the deep weblionheartban wrote: »Assuming said person is in another country or another continent, that's where international law is in effect. There's actually no law in effect with specific regard to DDoS/DoS attacks, unless you're a massive company with major backing the likeliness of a case going to court is very slim to none.
This is very true. -
This is really funny because I know something no one else knows LOL...
And no I'm not the ddos attacker. But still this is really funny! Pretty sure the guy is responsible for all your previous attacks too, (pugs, vent, mumble, ect). LAWL
I think everyone knows who (except ocg) -
We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.
-
We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.
slaya would never do that
you have the wrong person -
We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.
Tyze and Slaya, not the person I had in mind. But, lols... Goodjob, now are you going to get a lawyer and sue them or something? Send some FBI and CIA agents and arrest them? Bring them to justice? -
-
We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.
pfffff ahahaha
we all know you're just saying that
gl trying to prosecute him ahahaha -
Hello Gamers,
Over the last hour we've been experiencing a decently large DDOS/Botnet attack. The attack unfortunately came minutes before matches were starting for our league. We tried to hold off on making an announcement as long as we could, but the attacker(s) were persistent. After several minutes we figured out that we were getting hit by both a DDOS and a BOTNET attack that was large enough to knock down our DDOS protection.
With the attack on the site, it shutdown our AC completely and is still currently down. We were forced to allow alternative methods of insuring legitimate gameplay. Thus, you'll have to wait until Friday for the brackets to be fully updated.
We'd like to send our sincerest apologies to all the players who are competing in our league and using our Anti-Cheat. We will be prosecuting the attacker(s) to the full extent of the United States and International law.
More information will be released at a later time/date about the situation and what we'll be doing to make up for the downtime.
Regards,
Nick
Community Manager
Online Competitive Gaming, LLC.
A botnet attack is a type of DDoS so saying "botnet and ddos" attack is wrong.
A botnet itself is distributed due to many zombies/hosts. So it's already a Distributed Denial of Service attack.
Also, last time I checked SiteGround has little or no protection. Not sure why you're saying they do. Perhaps if you used a service like CloudFlare and updated the remote_ADDR request to the cloudflare HTTP CF IP (so that your visitors would have their real IP and not the CloudFlare one) then you wouldn't have the issues with your website at least.
I've seen these type of attacks time and time again. Prosecution isn't likely unless you have solid evidence. Usually if you aren't a large organization then whoever you report the attack to will not waste time looking into something that may be based on rumour or a false report. If you had full firewall logs of the attack from the attackers IP and had absolute proof it was them, then that would be another story.We indeed do have the money to seek a lawyer, as we have 3 partners in this company. If we pursue that route, that is our choice. I have been constantly watching this guy, use his botnets... Saying that there was a botnet attack with POST requests to our forum. I managed to block around 160 IPs, which stopped the attack for a good amount of time, but then it continued. I have decided to let the attack go through for the night, shutting down all the important servers. The issue will be stopped and fixed by the end of the week.
Thanks,
Evan
OCG President
I don't see how you're 'blocking' IP's unless you have access to the upper Cisco ACL routers on your webhost. (Which you definitely do not) If you were blocking IP's from a software firewall, that won't help a bit as it will saturate the link regardless. Traffic from the attack would have to be dropped off at an upper router in order to effectively mitigate the attack. (the upper router having an access control list or ACL for short - sometimes configuring the ACL to block attacks isn't easy either, it depends on what type of attack it is.)"Just like botnets, DDOS attacks have become stealthier and tougher to trace than ever, with layers of bot armies disguising the original source. 'Tracing a DDOS is a particularly vexing problem, with the whole notion of obfuscation and onion routing [techniques],' says Steve Bannerman, vice president of marketing and product management for Narus."
http://www.darkreading.com/perimeter/how-to-trace-a-ddos-attack/208804763
Ok.
wat.
Botnets aren't very stealthy as this article suggests. The only way they could be considered stealthy is if it's a very large botnet. It's more annoying to find an IP in the botnet list that may have inbound/outbound traffic monitored by the ISP so you can catch the attacker. Usually botnet traffic is not spoofed because it is on Windows. It's much harder to spoof IP's on Windows than it is on Linux. Almost ALL botnets are comprised of Windows machines.
You would send the attack from your own PC or a botnet operator machine then it would send traffic telling all of the bots to send a mass amount of traffic towards the victim. If one of the Zombies is marked/flagged by the ISP for sending out malicious traffic or identified as being infected then all of the traffic on the host will be monitored then shortly shutoff thereafter. As this ISP monitors this traffic they can find the botnet operators IP who sent the command to attack.
It's far more easy to use dedicated Linux servers and send out spoofed traffic than it is to upkeep a botnet army. It's also far more safe and almost impossible to trace without the right tools.We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.
If you are basing your conclusions off of rumour or what other people say about Slaya/Yokonoro then I would reconsider before trying to take legal action otherwise you will waste your time and money trying to prosecute someone without solid evidence. Evidence being proof of the attack (full packet recording if possible, + size/PPS/method/port/DST/SRC/etc, and their IP's/timestamps included or something irrefutably linking them to the attack. (which is pretty hard as nowdays almost anything online can be fabricated.) A "HE DID IT, SOMEONE TOLD ME HE DID!" will not hold up.
Best of luck to OCG. If you should have any questions for me or need help, feel free to email me ; Jon@frostgaming.com
This discussion has been closed.
Categories
- All Categories
- Z8Games
- 1 Z8 Forum Discussion & Suggestions
- 15 Z8Games Announcements
- Rules & Conduct
- 2.5K CrossFire
- 717 CrossFire Announcements
- 714 Previous Announcements
- 2 Previous Patch Notes
- 323 Community
- 12 Modes
- 393 Suggestions
- 16 Clan Discussion and Recruitment
- 73 CF Competitive Forum
- 1 CFCL
- 16 Looking for a Team?
- 524 CrossFire Support
- 7 Suggestion
- 15 CrossFire Guides
- 37 CrossFire Off Topic