Statement on OCG Attack

2

Comments

  • Not sure why this thread is still up, you'll never catch the person doing it nor will you ever acquire the proof to make a case. You don't have the money to hire a legal team or even one single lawyer.
    Well that's not good.

    We indeed do have the money to seek a lawyer, as we have 3 partners in this company. If we pursue that route, that is our choice. I have been constantly watching this guy, use his botnets... Saying that there was a botnet attack with POST requests to our forum. I managed to block around 160 IPs, which stopped the attack for a good amount of time, but then it continued. I have decided to let the attack go through for the night, shutting down all the important servers. The issue will be stopped and fixed by the end of the week.

    Thanks,
    Evan
    OCG President
  • OCGTrace wrote: »
    I thought DDoSing was a 5 year minimum penalty (in federal prison) in the United States of America.

    This isn't NASA or the FBI.
  • This isn't NASA or the FBI.

    If you'dve read a few posts below that I said I'd only heard that.
  • Jameseo wrote: »
    The person is using a botnet, which alone, is illegal as he/she's accessing people's computers without authorization, and using them in his/her attacks.

    Just an outline of the penalties of computer hacking from Connecticut laws because Google is awesome:
    http://www.cga.ct.gov/2012/rpt/2012-R-0254.htm

    What he/she has done applies to many of the listed acts.

    oh never knew that
  • DDoS/DoS falls under cyber crimes. At least in international law it does, not sure about US laws.


    I'm pretty sure the person attacking OCG isn't stupid enough to use a botnet.

    What's so stupid about using a botnet? A botnet is the strongest way of the average joe to attack anything right now. Shielding yourself behind other people's computers, and using them to your advantage is stupid? I would have never had guessed. Slaya. ;)
  • Doesnt matter if an attack was directed towards OCG, 1 single person, or the FBI, its still against that law to do such attacks.

    Now as for laws go, if the attacker is in a country that those laws have no affect in, then nothing can be done. But if that country does have such laws, then fines/jail time will be stated. (Correct me if I'm wrong)
  • Jameseo wrote: »
    What's so stupid about using a botnet? A botnet is the strongest way of the average joe to attack anything right now. Shielding yourself behind other people's computers, and using them to your advantage is stupid? I would have never had guessed. Slaya. ;)

    Botnets are easily traceable and anyone who uses one to attack a company is a moron. That's what I was getting at.
  • LANJPurvis wrote: »
    Doesnt matter if an attack was directed towards OCG, 1 single person, or the FBI, its still against that law to do such attacks.

    Now as for laws go, if the attacker is in a country that those laws have no affect in, then nothing can be done. But if that country does have such laws, then fines/jail time will be stated. (Correct me if I'm wrong)

    You're wrong.
  • Botnets are easily traceable and anyone who uses one to attack a company is a moron. That's what I was getting at.

    So what would you use if you were to attack OCG?
  • You're wrong.

    What do you know about this? I would like to know myself.
  • LANJPurvis wrote: »
    So what would you use if you were to attack OCG?

    a server with the proper hack tool
  • Botnets are easily traceable and anyone who uses one to attack a company is a moron. That's what I was getting at.

    "Just like botnets, DDOS attacks have become stealthier and tougher to trace than ever, with layers of bot armies disguising the original source. 'Tracing a DDOS is a particularly vexing problem, with the whole notion of obfuscation and onion routing [techniques],' says Steve Bannerman, vice president of marketing and product management for Narus."
    http://www.darkreading.com/perimeter/how-to-trace-a-ddos-attack/208804763

    Ok.
    a server with the proper hack tool
    wat.
  • Jameseo wrote: »
    "Just like botnets, DDOS attacks have become stealthier and tougher to trace than ever, with layers of bot armies disguising the original source. 'Tracing a DDOS is a particularly vexing problem, with the whole notion of obfuscation and onion routing [techniques],' says Steve Bannerman, vice president of marketing and product management for Narus."
    http://www.darkreading.com/perimeter/how-to-trace-a-ddos-attack/208804763

    Ok.


    wat.

    i dunno, knew some kid in high school he was caught by the FBI DDoS stuff, they didn't do anything to him however, but some of the stuff he used he showed me when he brought laptop to school, he mostly shut down CP sites and Islamic sites using a server to sustain an attack because using other people's IPs would make it easier to get caught some how, the tool he used was a pre-made tool from a hacker off the deep web
  • LANJPurvis wrote: »
    What do you know about this? I would like to know myself.

    Assuming said person is in another country or another continent, that's where international law is in effect. There's actually no law in effect with specific regard to DDoS/DoS attacks, unless you're a massive company with major backing the likeliness of a case going to court is very slim to none.
  • Assuming said person is in another country or another continent, that's where international law is in effect. There's actually no law in effect with specific regard to DDoS/DoS attacks, unless you're a massive company with major backing the likeliness of a case going to court is very slim to none.

    That's what I was saying.

    Just because someone attacked a US based company and broke the law doesn't mean it applies to the home county of the attacker.
  • DDoS has precedent of being a labeled

    like
    a valid form of protest anyway





















    so

    itd be a pretty easy charge to mitigate







    d00ds
  • i dunno, knew some kid in high school he was caught by the FBI DDoS stuff, they didn't do anything to him however, but some of the stuff he used he showed me when he brought laptop to school, he mostly shut down CP sites and Islamic sites using a server to sustain an attack because using other people's IPs would make it easier to get caught some how, the tool he used was a pre-made tool from a hacker off the deep web
    Yeah, those kind of people are known as White Hat hackers if I'm not wrong. They use their power for good, instead of evil and that's probably why he didn't have any issues with the authorities. He's lucky he got a script like that from someone online though. Interesting. But... I have one question: Why the hell would you download anything you're given from the deep web? Lol. Never know what you'll get there.
    Assuming said person is in another country or another continent, that's where international law is in effect. There's actually no law in effect with specific regard to DDoS/DoS attacks, unless you're a massive company with major backing the likeliness of a case going to court is very slim to none.

    This is very true.
  • Did they ever find out/stop who was doing it in the first place, because if not, I doubt they will this time.
  • This is really funny because I know something no one else knows LOL...
    And no I'm not the ddos attacker. But still this is really funny! Pretty sure the guy is responsible for all your previous attacks too, (pugs, vent, mumble, ect). LAWL
  • theFOOB wrote: »
    This is really funny because I know something no one else knows LOL...
    And no I'm not the ddos attacker. But still this is really funny! Pretty sure the guy is responsible for all your previous attacks too, (pugs, vent, mumble, ect). LAWL

    I think everyone knows who (except ocg)
  • I think everyone knows who (except ocg)

    Awwww I thought I was specials for duh moment :(


    Then OCG is pretttty stupid.............. Especially nick, no offense. Just kidding, take offense....
  • We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.
  • OCGNick wrote: »
    We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.

    slaya would never do that

    you have the wrong person
  • OCGNick wrote: »
    We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.

    Tyze and Slaya, not the person I had in mind. But, lols... Goodjob, now are you going to get a lawyer and sue them or something? Send some FBI and CIA agents and arrest them? Bring them to justice? :D
  • slaya would never do that

    you have the wrong person

    ahaha his post is complete B.S. and the DDoS attacks will continue
  • 99.9233586 % sure that AwfulFallout guy did it. never trusted him.
  • Lols.

    Like everyone else said, that 'prosecution' line made you look like a giant tool. Good luck with your legal endeavors. :)
  • OCGNick wrote: »
    We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.

    pfffff ahahaha

    we all know you're just saying that

    gl trying to prosecute him ahahaha
  • OCGNick wrote: »
    Hello Gamers,

    Over the last hour we've been experiencing a decently large DDOS/Botnet attack. The attack unfortunately came minutes before matches were starting for our league. We tried to hold off on making an announcement as long as we could, but the attacker(s) were persistent. After several minutes we figured out that we were getting hit by both a DDOS and a BOTNET attack that was large enough to knock down our DDOS protection.

    With the attack on the site, it shutdown our AC completely and is still currently down. We were forced to allow alternative methods of insuring legitimate gameplay. Thus, you'll have to wait until Friday for the brackets to be fully updated.

    We'd like to send our sincerest apologies to all the players who are competing in our league and using our Anti-Cheat. We will be prosecuting the attacker(s) to the full extent of the United States and International law.

    More information will be released at a later time/date about the situation and what we'll be doing to make up for the downtime.


    Regards,

    Nick
    Community Manager
    Online Competitive Gaming, LLC.

    A botnet attack is a type of DDoS so saying "botnet and ddos" attack is wrong.

    A botnet itself is distributed due to many zombies/hosts. So it's already a Distributed Denial of Service attack.

    Also, last time I checked SiteGround has little or no protection. Not sure why you're saying they do. Perhaps if you used a service like CloudFlare and updated the remote_ADDR request to the cloudflare HTTP CF IP (so that your visitors would have their real IP and not the CloudFlare one) then you wouldn't have the issues with your website at least.

    I've seen these type of attacks time and time again. Prosecution isn't likely unless you have solid evidence. Usually if you aren't a large organization then whoever you report the attack to will not waste time looking into something that may be based on rumour or a false report. If you had full firewall logs of the attack from the attackers IP and had absolute proof it was them, then that would be another story.

    OCGEvan wrote: »
    We indeed do have the money to seek a lawyer, as we have 3 partners in this company. If we pursue that route, that is our choice. I have been constantly watching this guy, use his botnets... Saying that there was a botnet attack with POST requests to our forum. I managed to block around 160 IPs, which stopped the attack for a good amount of time, but then it continued. I have decided to let the attack go through for the night, shutting down all the important servers. The issue will be stopped and fixed by the end of the week.

    Thanks,
    Evan
    OCG President

    I don't see how you're 'blocking' IP's unless you have access to the upper Cisco ACL routers on your webhost. (Which you definitely do not) If you were blocking IP's from a software firewall, that won't help a bit as it will saturate the link regardless. Traffic from the attack would have to be dropped off at an upper router in order to effectively mitigate the attack. (the upper router having an access control list or ACL for short - sometimes configuring the ACL to block attacks isn't easy either, it depends on what type of attack it is.)
    Jameseo wrote: »
    "Just like botnets, DDOS attacks have become stealthier and tougher to trace than ever, with layers of bot armies disguising the original source. 'Tracing a DDOS is a particularly vexing problem, with the whole notion of obfuscation and onion routing [techniques],' says Steve Bannerman, vice president of marketing and product management for Narus."
    http://www.darkreading.com/perimeter/how-to-trace-a-ddos-attack/208804763

    Ok.


    wat.

    Botnets aren't very stealthy as this article suggests. The only way they could be considered stealthy is if it's a very large botnet. It's more annoying to find an IP in the botnet list that may have inbound/outbound traffic monitored by the ISP so you can catch the attacker. Usually botnet traffic is not spoofed because it is on Windows. It's much harder to spoof IP's on Windows than it is on Linux. Almost ALL botnets are comprised of Windows machines.

    You would send the attack from your own PC or a botnet operator machine then it would send traffic telling all of the bots to send a mass amount of traffic towards the victim. If one of the Zombies is marked/flagged by the ISP for sending out malicious traffic or identified as being infected then all of the traffic on the host will be monitored then shortly shutoff thereafter. As this ISP monitors this traffic they can find the botnet operators IP who sent the command to attack.

    It's far more easy to use dedicated Linux servers and send out spoofed traffic than it is to upkeep a botnet army. It's also far more safe and almost impossible to trace without the right tools.
    OCGNick wrote: »
    We've successfully mitigated the attack and found the attack was started from two locations. We found that the attack originated from Sweden and Australia. With further research we've found it was Tyze (previously in Yokonoro) and 99.9% sure it's Slaya. DDOSing us will not stop us from doing what were here to do.

    If you are basing your conclusions off of rumour or what other people say about Slaya/Yokonoro then I would reconsider before trying to take legal action otherwise you will waste your time and money trying to prosecute someone without solid evidence. Evidence being proof of the attack (full packet recording if possible, + size/PPS/method/port/DST/SRC/etc, and their IP's/timestamps included or something irrefutably linking them to the attack. (which is pretty hard as nowdays almost anything online can be fabricated.) A "HE DID IT, SOMEONE TOLD ME HE DID!" will not hold up.

    Best of luck to OCG. If you should have any questions for me or need help, feel free to email me ; Jon@frostgaming.com
This discussion has been closed.