Skip to main content

Need to take down a website? Lizard Squad will do it, for a fee

brian krebs project shield ddosattack
Being allegedly unmasked hasn’t slowed Lizard Squad down, as only a day later the group has announced a paid service for anyone seeking to DDoS a website or network, regardless of the reason. The group says its attacks on the PlayStation Network and Xbox Live, which seemed without cause, were just marketing for this new rental botnet.

The hacker group launched the product, which it calls “Lizard Stresser,” on Tuesday morning through Twitter (the group’s normal means of communication). Any customer willing to pay for access to the Stresser can, according to Lizard Squad, render a target website, service or network inaccessible until the attack is called off.

Related Videos

How much does it cost? According to screenshots from The Daily Dot fees range from as little as six dollars to as much as $500. The highest tier of service allegedly lets customers launch attacks that will make a target inaccessible for about twenty days. Seems like good value for money, if it works.

“If it works” is the big question. Rental botnets are nothing new, and like all illegal services they have a sketchy reputation. Providers are as likely to run off with customers money as deliver the service promised. An attack as massive as that offered by Lizard Squad would be hard to miss, though, so the world should know if the service works as advertised in short order.

Of course, this move only increases the criminal risk endured by members of Lizard Squad. The recent reveal of two members by Internet security journalist Brian Krebs may have exposed a hole in the group’s supposedly iron-clad anonymity, putting its members at greater risk for investigation and arrest. The fact the group decided to go ahead with its service the day after shows determination, but it may prove fool-hardy in the long run.

Image Credit: Duc Doc/Shutterstock

Editors' Recommendations

Black Lives Matter website hit by more than 100 DDoS attacks in seven months
black lives matter ddos attacks attack oct 21v2

New data published this week demonstrates the scale and scope of cyber-attacks launched against the official website for the Black Lives Matter movement. Over the course of seven months in 2016, more than 100 distributed denial-of-service (DDoS) attacks were leveled against the site, with the intention of making it inaccessible to visitors.

DDoS mitigation service Deflect Labs was called upon to help the organization respond to these attacks, and today the company published a report spanning from April to October. Attacks began to grow in size and frequency in July, followed by another substantial increase in September and October, according to a report from Motherboard.

Read more
New guidelines to protect smart home devices from botnets and privacy invasion
black lives matter ddos attacks attack oct 21v2

Are there Trojan horses in your home and in your neighbors' homes and apartments waiting for signals to attack? The inherent vulnerability from untended internet connectivity is an unplanned, unsavory, and unacceptable consequence of the rapid proliferation of smart devices in homes. In an attempt to control or at least minimize security and privacy threats, a major industry group released recommendations for Internet of Things (IoT) manufacturers, especially those that make products sold for use in consumer's homes.

The Broadband Internet Technical Advisory Group (BITAG) represents a broad cross-section of internet companies. The group's purpose is to bring transparency and clarity to internet management and to the interactions among networks, applications, devices, and content that can affect users' internet experience.

Read more
How to keep your gadgets from being part of a botnet
black lives matter ddos attacks attack oct 21v2

The massive DDoS attack that made it impossible for some people to access sites like Twitter, GitHub, and Spotify, was a wake-up call for many of us. Though it did no permanent damage, and no personal data was at risk (unlike recently disclosed attacks on Yahoo), it managed to disrupt wide swaths of the Internet for several hours. Much like a short-lived blackout, it was mostly an inconvenience. But it could have been much worse.
What did the DDoS attack do?
Typically, DDoS (Distributed Denial of Service) attacks are aimed at individual entities, like the one that Sony and several others suffered in 2014. When this happens, the company’s online services are disrupted, which in that case led to gamers being cut off from the Playstation Network and Xbox Live.

Friday’s attack targeted Dyn, a major provider of DNS services. Because Dyn’s DNS servers are responsible for translating domain names like www.digitaltrends.com into IP addresses, any company that was using Dyn to host their DNS became like a house on a street without its address displayed. The house was still there of course -- if you already knew how to find it on your own, you could still get to it -- but there was not way to look it up on Google Maps.

Read more