Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

Brit hacker hired by Liberian telco to nobble rival now behind bars

Bloke binned at Blackfriars for blasting botnet to bork broadband

A Surrey man has been jailed for 32 months after admitting to launching distributed denial-of-service (DDoS) attacks against an African telco.

Daniel Kaye, 30, of Egham, told the Blackfriars Crown Court that back in 2016 he took a monthly salary from Liberian company Cellcom to carry out a sustained DDoS against their rival telco Lonestar. According to the National Crime Agency, at its peak Kaye's attack was so heavy that it disabled internet access for most of the country.

Living in Cyprus at the time, Kaye built himself a Mirai botnet pieced together using hijacked Dahua security cameras and infected devices "rented" from other hackers. He then accepted the monthly retainer from Cellcom and proceeded to run the attack in the latter half of 2016.

When the attacks finally subsided, Lonestar said it suffered tens of millions of dollars in lost business and had to directly pay $600,000 to fully ameliorate the effects of the DDoS attack.

That botnet, referred to as "#14" by researchers, was among the largest on the internet, and at one point was said to have accounted for more than half of all Mirai infections on the planet.

man holds magnifying glass

Cops: German suspect, 20, 'confessed' to mass hack of local politicians

READ MORE

Kaye was arrested in February of 2017 and pled guilty last month to counts of creating and using a botnet and possessing criminal property. Between that, he also got a free trip to Germany where he was tried for a separate 2016 DDoS on Deutsche Telekom (he would get a suspended sentence for that one.) Kaye was also said to be tied to DDoS attacks against Lloyd's, Barclays, and Halifax banks in the UK.

Though much of the Mirai #14 botnet Kaye used was said to have been machines rented from other hackers, prosecutors described the 30-year-old as a "highly skilled and capable hacker-for-hire" in announcing the two years and eight months prison term this month.

"Kaye was a talented and sophisticated cyber criminal who created one of the world's largest networks of compromised computers which he then made available to other cyber criminals with no consideration as to the damage it would cause," said Russell Tyner from the UK Crown Prosecution Service (CPS).

"The CPS and the NCA together with the authorities in Germany and Cyprus worked closely together in order to bring him to justice." ®

Similar topics

Similar topics

Similar topics

TIP US OFF

Send us news


Other stories you might like