Friday, March 21, 2025
HomeDDOSDDoS Attack Service Admin Behind 200,000 Attacks Face 35 Years in Prison

DDoS Attack Service Admin Behind 200,000 Attacks Face 35 Years in Prison

Published on

SIEM as a Service

Follow Us on Google News

A federal jury in California, at the end of a nine-day trial, found an Illinois man guilty, who have operated several websites with paid DDoS attack services. 

After executing an investigation it was found that 32-year old Matthew Gatrel of St. Charles, Illinois allowed users to launch more than 200,000 DDoS attacks for which he may face 35-years in prison

Matthew Gatrel was found guilty of three crimes and here they are mentioned below:-

  • Conspiracy to commit unauthorized impairment of a guarded computer.
  • Conspiracy to commit wire fraud.
  • For committing unauthorized impairment of a secured computer.

Bulletproof server hosting and DDoS services

Since at least October 2014, Matthew has been operating the DDoS services, and mainly he ran two websites with illegal paid DDoS attack services; here they are mentioned below:-

  • DownThem.[org]
  • AmpNode.[com]

Here via DownThem.[org] website Matthew use to provide DDoS attacks services to users, while through the second website, AmpNode.[com] he use to provide “bulletproof” server hosting to its users.

The most interesting thing about the servers is that it provides two key abilities, and they are:-

  • Spoofing
  • Lists of vulnerable attack amplifiers

In the “DownThem” web portal the security authorities have found more than 2000 registered users, and all these users are the ones who have actually executed more than 200,000 DDoS attacks.

Here’s what the U.S. Department of Justice stated:-

“Often called a “booting” service, DownThem itself relied upon powerful servers associated with Gatrel’s AmpNode bulletproof hosting service. Many AmpNode customers were themselves operating for-profit DDoS services.”

Targets

Here’s the list of targets that are attacked in these DDoS attack events:-

  • Homes
  • Schools
  • Universities
  • Municipal
  • Local government websites
  • Financial institutions from all over the world

Moreover, in his web portals, there are several options are provided by him to his customers like multiple services, multiple subscription packages, various attack capabilities like:-

  • Duration of the attacks
  • Strength of the attacks
  • The possibility of concurrent attacks

Apart from this, for Gatrel’s final trial and imprisonment hearing, John A. Kronstadt, the United States District Judge has fixed January 27, 2022, as the final date, and in this time he may face a statutory maximum sentence of 35-years in prison.

In this event, Gatrel is not alone, since with him 28-year old Juan Martinez is also involved, as he helped Gatrel in managing and administering the DownThem website for their illegal activities.

However, Juan Martinez already pleaded guilty unlike Gatrel, and right now he was is awaiting his final hearing which is scheduled for December 2, and in his final trial, he may face a statutory maximum sentence of 10-years in prison.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...