Leaked data for sale through forums and marketplaces in cybercrime appears so frequent that it is essentially unknown, except for the choice of an individual victim. However, these leaks might show that a site or service has been compromised – possibly without the wiser being the operators.
One such prospective victim is the apparent Russian company DDoS-Guard, which protects against distributed denial-of-service attacks. The company’s supposed client data was presented on a cybercrime forum for sale.
The DDoS Guard offers DDoS protection, network content delivery services, and Web Hosting services. It is a Russian Internet infrastructure company.
On the 26th of May, a user put on Exploit.in “the full dump on the popular online DDoS-Guard service” for auction, with an opening sale price set at 500,000 dollars, or a blitz price set at 1.5 million dollars, with “buy it now.” However, later on, the auction was started at $350,000.
Singapore-based cybersecurity firm Group-IB reports that beyond DDoS defenses, “DDoS-Guard also provides computing capacities and obstructs the identification of website owners of hundreds of shady resources that are engaged in illicit goods sale, gambling and copyright infringements.” “
We’ve seen several rogue websites hosted by DDoS-Guard,” says Reza Rafati, a senior analyst at Group-IB’s CERT-GIB incident response unit in Amsterdam. “They were almost impossible to take down. Their answer to our numerous complaints on them protecting illegal resources is that they are not the owners of these websites. Such a safe environment for illicit online activity doesn’t do any good for the global effort against cybercrime.”
The DDoS-Guard customer database listed “all info such as name, site, real IP, payment info, etc.” in the Exploit.in leak. The user claimed that several renowned websites, including RuTracker.org, which is a BitTorrent Russian tracking service, are also featured on the client list. The listing says that the DDoS-Guard “infrastructure, backend, front end, and network filtering/blocking” are all included in the sale.
A DDoS-Guard Spokesperson nevertheless rejected the Exploit.in claims of the seller. “We are aware that malefactors are trying to sell a certain database. Our company has not experienced any data leaks,” Ruvim Shamilov, DDoS-Guard’s PR manager, stated.
SecurityTrails includes Hamas, which is the Palestinian militant party that rules Gaza, as well as enormous sites of squamous names that are potentially used by fraudsters, like “bitdefender-centrals.com,” “nortoncomsetupz.com” and “garmin-express.support,” which are attributed to DDoS-Guard by the domain and IP Address service SecurityTtrails.”
For DDoS-Guard users, soon it would be possible to identify anyone who has been operating sites on their service, depending on who takes their hands on the client base dump. Yet legal enforcement agencies are probably already informed, says cyber-security expert Alan Woodward.
“Anything that is done at scale, and particularly where it is crime as a service, is bound to attract the attention of the police,” says Woodward. In addition to finding ways to interrupt services connected with illegal activity, law enforcement organizations have shown themselves to follow users of the service.
click here to read full Article
Read More on Cyber Hacking News
Like this:
Like Loading...
Related