Bitcoin blackmail gang start hurling DDoSes at Scandinavia

Cough up or we'll blitz you again, scum tell hapless marks

Bitcoin extortionists DD4BC have begun targeting Scandinavian companies with complex DDoS attacks.

DD4BC is blackmailing targets by asking them to pay 40 bitcoins or more to avoid their central services being subject to DDoS attacks. Extortionate demands typically appear in emails around an hour after targets are blitzed off the web with high-volume assaults, reports Danish security firm Heimdal Security.

The group assured victims that they are only extracting a one-off payment, according to extracts from one extortionate demand from the group obtained by Heimdal.

Pay and you will not hear from us ever again!

In many cases, our "customers" fear that if they pay us once, we will be back and ask for more. That’s not how we work. We never attack the same target twice.

We do bad things, but we keep our word.

DD4BC has previously targeting financial institutions all over Europe prior to its latest forays against targets in Scandinavia.

Heimdal reports that the group typically ramps up the level of attack, and varies the mechanism of assaults, to cause victims the maximum possible discomfort.

"The typical pattern for the DD4BC gang is to launch DDoS attacks targeting Layer 3-4, but if this does not have the desired effect, they will/can move it to layer 7 with various types of loop back attacks with post/get requests," wrote Andra Zaharia, a marketing & communication exec at Heimdal Security. "The initial attack typically lies on a scale between 10-20GBps. This is rather massive, but often not even close to the real threat."

DD4BC typically move on after 24 hours of a sustained attack but victims shouldn't necessarily rely on that, Heimdal cautions. ®

Similar topics

Broader topics

Other stories you might like

  • SpaceX Starlink satellite streaks now present in nearly fifth of all astronomical images snapped by Caltech telescope

    Annoying, maybe – but totally ruining science, no

    SpaceX’s Starlink satellites appear in about a fifth of all images snapped by the Zwicky Transient Facility (ZTF), a camera attached to the Samuel Oschin Telescope in California, which is used by astronomers to study supernovae, gamma ray bursts, asteroids, and suchlike.

    A study led by Przemek Mróz, a former postdoctoral scholar at the California Institute of Technology (Caltech) and now a researcher at the University of Warsaw in Poland, analysed the current and future effects of Starlink satellites on the ZTF. The telescope and camera are housed at the Palomar Observatory, which is operated by Caltech.

    The team of astronomers found 5,301 streaks leftover from the moving satellites in images taken by the instrument between November 2019 and September 2021, according to their paper on the subject, published in the Astrophysical Journal Letters this week.

    Continue reading
  • AI tool finds hundreds of genes related to human motor neuron disease

    Breakthrough could lead to development of drugs to target illness

    A machine-learning algorithm has helped scientists find 690 human genes associated with a higher risk of developing motor neuron disease, according to research published in Cell this week.

    Neuronal cells in the central nervous system and brain break down and die in people with motor neuron disease, like amyotrophic lateral sclerosis (ALS) more commonly known as Lou Gehrig's disease, named after the baseball player who developed it. They lose control over their bodies, and as the disease progresses patients become completely paralyzed. There is currently no verified cure for ALS.

    Motor neuron disease typically affects people in old age and its causes are unknown. Johnathan Cooper-Knock, a clinical lecturer at the University of Sheffield in England and leader of Project MinE, an ambitious effort to perform whole genome sequencing of ALS, believes that understanding how genes affect cellular function could help scientists develop new drugs to treat the disease.

    Continue reading
  • Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores

    Exploit, vulnerability discussion online can offer useful signals

    Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues.

    Better still is prioritizing the repair of vulnerabilities for which exploit code is available, if that information is known.

    CVSS is a framework for rating the severity of software vulnerabilities (identified using CVE, or Common Vulnerability Enumeration, numbers), on a scale from 1 (least severe) to 10 (most severe). It's overseen by, a US-based, non-profit computer security organization.

    Continue reading

Biting the hand that feeds IT © 1998–2022