Thursday, March 28, 2024

American Hacker Got 10 Years Prison for DDoS Attack on Hospitals

U.S citizen sentenced 10 years in prison for Massive DDOS attacks against 2 hospitals on U.S Boston Children’s Hospital and Wayside Youth and Family Support Network in 2014.

Martin Gottesfeld, 32, convicted for launching massive DDoS attacks and the attack was launched more than a week that caused the facility to spend $18,000.

He was installed a malicious software on 40,000 network routers that was controlled by his home computer and used those compromised computers to launch the DDOS attack.

Gottesfeld is one of the member of international hacking group, behalf of the group he was launched this attack on Boston Children’s Hospital .

The attack flooded 65,000 IP addresses used by Boston Children’s Hospital and several other area hospitals with junk data intended to make those computers unavailable for legitimate communications. 

According to Router report, Federal officials in August found him guilty of two counts, including conspiracy to damage protected computers related to cyberattacks he carried out in 2014 on Boston Children’s Hospital and another facility.

Due to this attack, the hospital’s day-to-day operations, as well as its research capabilities and hospital more than $300,000 and caused an additional estimated $300,000 loss in donations.

Law enforcement officials searched Gottesfeld’s home and recovered a number of computers, servers, and hard drives.

Finally, now he got 10 years in prison and the court ordered to pay nearly $443,000 to compensate the damages.

Related Read

DDoS-For-Hire Services – 15 Websites Has Been Seized That Offering DDoS Services

Who and Why Make DDoS Attacks on The Site of Colleges and Universities ?


Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles