Thursday, February 13, 2025
HomeSecurity News15 Years Prison for 46-year-old Mexico Man Who Launched DDoS Attack against...

15 Years Prison for 46-year-old Mexico Man Who Launched DDoS Attack against Ex-employer Websites

Published on

SIEM as a Service

Follow Us on Google News

A 46-year-old Mexico man John Kelsey Gammell was sentenced by Department of Justice’s Criminal Division for launching the DDoS attack against websites of his prior employers, business competitors, and public services.

Gammel launched DDoS attacks by running tools on his own computers, as well as opted DDoS-for-hire subscriptions form a number of companies including VDoS, CStress, Inboot, Booter[.]xyz and IPStresser.

According to the department of justice “from at least in or about July 2015 through in or about March 2017, Gammell engaged in a campaign of distributed denial of service (DDoS) attacks on websites throughout the United States.”

Gammell Mainly targeted the websites that belong to the companies that he used to work for, companies that declined to hire him, competitors of his business.

Since various Powerful DDoS attacks are being targeted on many organization and the companies should focus on DDoS protection also you can regularly check the DDoS Attacks risk cost of your organization using DDoS Downtime Cost Calculator.

A DDoS attack is a malicious attempt to disable or interrupt service to a computer or website, usually by causing large amounts of Internet traffic to be directed to the computer or website.

Also Read How to protect your Organization From DDOS Attack

“FBI find various types of equipment such as AR-15 assault rifles, upper and lower receivers, a pistol grip, a trigger guard, 15 high-capacity magazines, a buttstock, a buffer tube, and 420 rounds of 5.56 x 45mm full metal jacket rifle ammunition in Colorado, where he worked.”

“Gammell pleaded guilty on Jan. 17, to one count of conspiracy to cause intentional damage and he was sentenced to serve 180 months in prison by U.S. District Judge Wilhelmina M. Wright of the District of Minnesota.” Official said.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

In a continued commitment to enhancing user safety and trust, Google has outlined significant...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...