Despite his insistence that he’s never launched DDoS attacks, Rasbora did eventually allow that someone reading his posts on Hackforums might conclude that he was actively involved in DDoS attacks for hire. Rasbora’s most recent project just happens to be gathering, maintaining huge “top quality” lists of servers that can be used to launch amplification attacks online. Here’s an excerpt of what I wrote about Sergiy at the time: That 2014 story declined to quote Rasbora by name because he was a minor then, but his father seemed alarmed enough about my inquiry that he insisted his son speak with me about the matter. If you think that is any kind of illegal work, please, let me know.” “I also have major concern what my 15 yo son doing. “I am writing you after our phone conversation just to confirm that you may call evening time/weekend to talk to my son Sergio regarding to your reasons,” Peter Usatyuk wrote in an email to this author on Feb. I phoned Usatyuk the elder because Sergiy’s alter egos had been posting evidence on Hackforums and elsewhere that he’d just hit with a 200 Gbps DDoS attack, which was then considered a fairly impressive DDoS assault. Booter Master” - was heavily involved in helping to launch crippling DDoS attacks. I did so because a brief amount of sleuthing on Hackforumsnet revealed that his then 15-year-old son Sergiy - who at the time went by the nicknames “Rasbora” and “Mr. In February 2014, KrebsOnSecurity reached out to Usatyuk’s father Peter Usatyuk, an assistant professor at the University of Illinois at Chicago. But Usatyuk’s involvement in the DDoS-for-hire space very much predates that period. Usatyuk - operating under the hacker aliases “Andrew Quez” and “Brian Martinez,” among others - admitted developing, controlling and operating the aforementioned booter services from around August 2015 through November 2017. As of September 12, 2017, ExoStresser advertised on its website that this one booter service had launched 1,367,610 DDoS attacks, and caused targets to suffer 109,186.4 hours of network downtime (-4,549 days). Justice Department, in just the first 13 months of the 27-month long conspiracy, Usatyuk’s booter users ordered approximately 3,829,812 DDoS attacks. Usatyuk of Orland Park, Ill., who pleaded guilty in February to one count of conspiracy to cause damage to Internet-connected computers and owning, administering and supporting illegal “booter” or “stresser” services designed to knock Web sites offline, including exostressin, quezstressercom, betabootercom, databootercom, instabootercom, polystresscom and zstressnet.Īccording to the U.S. The jail time was handed down to Sergiy P. One of the most popular,, was taken down by police in 2018 and was responsible for over four million attacks.Įuropol recently launched an operation to track down its 150,000 customers.A screenshot of databootercom, circa 2017. Usatyuk and his co-conspirator are said to have made over $550,000 from their DDoS-for-hire services.īooter or stresser services are a popular way for budding cyber-criminals with little technical know-how to make money from DDoS attacks. Anyone who weaponizes web traffic in this manner will be vigorously pursued and prosecuted by my office.” “The operation and use of these services to disrupt the operations of our businesses and other institutions cannot be tolerated.
![quez stresser booter quez stresser booter](https://i.ytimg.com/vi/muA_KPyYJFI/maxresdefault.jpg)
“DDoS-for-hire services pose a malicious threat to the citizens of our district, as well as districts across the country, by impeding critical access to the internet and jeopardizing safety and security in the process,” said US attorney for the Eastern District of North Carolina, Robert Higdon Jr. One Betabooter customer launched DDoS attacks against a school district in Pittsburgh that also impacted 17 organizations that shared the same underlying infrastructure, including other school districts, the county government, career and technology centers and a Catholic Diocese, according to the indictment. He’s said to have owned and managed illegal booter services which were used to launch DDoS attacks on millions of victims in the US and abroad.Īs part of the verdict, Usatyuk has been ordered to forfeit $542,925 in proceeds from the scheme, and hand over dozens of servers and other computer equipment used in the operation.įrom around August 2015 to November 2017, he’s said to have teamed up with a co-conspirator to run several booter sites including: ExoStress.in and .Īs well as the intended targets, some of the attacks also affected other organizations. Usatyuk, 21, of Orlando Park, was charged with one count of conspiracy to cause damage to internet-connected computers.
![quez stresser booter quez stresser booter](http://i.ytimg.com/vi/LVzJL-Ox5oo/0.jpg)
An Illinois man has been sentenced to 13 months behind bars after participating in a DDoS-for-hire scheme which made him over half a million dollars.