Categories: Security News

15 Years Prison for 46-year-old Mexico Man Who Launched DDoS Attack against Ex-employer Websites

A 46-year-old Mexico man John Kelsey Gammell was sentenced by Department of Justice’s Criminal Division for launching the DDoS attack against websites of his prior employers, business competitors, and public services.

Gammel launched DDoS attacks by running tools on his own computers, as well as opted DDoS-for-hire subscriptions form a number of companies including VDoS, CStress, Inboot, Booter[.]xyz and IPStresser.

According to the department of justice “from at least in or about July 2015 through in or about March 2017, Gammell engaged in a campaign of distributed denial of service (DDoS) attacks on websites throughout the United States.”

Gammell Mainly targeted the websites that belong to the companies that he used to work for, companies that declined to hire him, competitors of his business.

Since various Powerful DDoS attacks are being targeted on many organization and the companies should focus on DDoS protection also you can regularly check the DDoS Attacks risk cost of your organization using DDoS Downtime Cost Calculator.

A DDoS attack is a malicious attempt to disable or interrupt service to a computer or website, usually by causing large amounts of Internet traffic to be directed to the computer or website.

Also Read How to protect your Organization From DDOS Attack

“FBI find various types of equipment such as AR-15 assault rifles, upper and lower receivers, a pistol grip, a trigger guard, 15 high-capacity magazines, a buttstock, a buffer tube, and 420 rounds of 5.56 x 45mm full metal jacket rifle ammunition in Colorado, where he worked.”

“Gammell pleaded guilty on Jan. 17, to one count of conspiracy to cause intentional damage and he was sentenced to serve 180 months in prison by U.S. District Judge Wilhelmina M. Wright of the District of Minnesota.” Official said.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

4 hours ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

5 hours ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

5 hours ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

5 hours ago

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…

5 hours ago

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’

ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…

5 hours ago