Tuesday, March 4, 2025
HomeSecurity News15 Years Prison for 46-year-old Mexico Man Who Launched DDoS Attack against...

15 Years Prison for 46-year-old Mexico Man Who Launched DDoS Attack against Ex-employer Websites

Published on

SIEM as a Service

Follow Us on Google News

A 46-year-old Mexico man John Kelsey Gammell was sentenced by Department of Justice’s Criminal Division for launching the DDoS attack against websites of his prior employers, business competitors, and public services.

Gammel launched DDoS attacks by running tools on his own computers, as well as opted DDoS-for-hire subscriptions form a number of companies including VDoS, CStress, Inboot, Booter[.]xyz and IPStresser.

According to the department of justice “from at least in or about July 2015 through in or about March 2017, Gammell engaged in a campaign of distributed denial of service (DDoS) attacks on websites throughout the United States.”

Gammell Mainly targeted the websites that belong to the companies that he used to work for, companies that declined to hire him, competitors of his business.

Since various Powerful DDoS attacks are being targeted on many organization and the companies should focus on DDoS protection also you can regularly check the DDoS Attacks risk cost of your organization using DDoS Downtime Cost Calculator.

A DDoS attack is a malicious attempt to disable or interrupt service to a computer or website, usually by causing large amounts of Internet traffic to be directed to the computer or website.

Also Read How to protect your Organization From DDOS Attack

“FBI find various types of equipment such as AR-15 assault rifles, upper and lower receivers, a pistol grip, a trigger guard, 15 high-capacity magazines, a buttstock, a buffer tube, and 420 rounds of 5.56 x 45mm full metal jacket rifle ammunition in Colorado, where he worked.”

“Gammell pleaded guilty on Jan. 17, to one count of conspiracy to cause intentional damage and he was sentenced to serve 180 months in prison by U.S. District Judge Wilhelmina M. Wright of the District of Minnesota.” Official said.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...