Biz & IT —

Six UK teens arrested for being “customers” of Lizard Squad’s DDoS service

Amazon, Microsoft, and Sony were targets; service is almost ready to re-open for business.

The Lizard Stresser site in January, after its user database was breached. Six UK teens were in the database—and were arrested last week.
The Lizard Stresser site in January, after its user database was breached. Six UK teens were in the database—and were arrested last week.
Sean Gallagher

On August 28, the United Kingdom’s National Crime Agency announced the arrest of six teenagers, ranging in age from 15 to 18, for launching distributed denial of service attacks against multiple websites. The attacks were carried out using an attack tool created by Lizard Squad, the group behind denial of service attacks on gaming networks and the 8Chan imageboard site last winter. Called Lizard Stresser, the tool exploited compromised home routers, using them as a robot army against targeted sites and services.

The six arrested “are suspected of maliciously deploying Lizard Stresser, having bought the tool using alternative payment services such as Bitcoin in a bid to remain anonymous,” an NCA spokesperson wrote in an official statement on the case. “Organizations believed to have been targeted by the suspects include a leading national newspaper, a school, gaming companies, and a number of online retailers.” Those sites, according to a source that spoke with Bloomberg Business, included Microsoft’s Xbox Live, Sony’s Playstation network, and Amazon.com.

The timing of the attacks wasn’t mentioned by NCA. However, the user database of Lizard Stresser was leaked in January of this year. The NCA has been investigating individuals listed in the database and has identified a substantial number of them living in the UK. “Officers are also visiting approximately 50 addresses linked to individuals registered on the Lizard Stresser website, but who are not currently believed to have carried out attacks,” the NCA spokesperson noted. “A third of the individuals identified are under the age of 20, and the activity forms part of the NCA’s wider work to address younger people at risk of entering into serious forms of cyber crime.”

“Everyone raided was a customer,” someone posting to the Lizard Squad Twitter account noted on Saturday. “The NCA also said they are customers. Members of our group wouldn’t buy our product.”

While no members of Lizard Squad were arrested in this wave of raids, several members of Lizard Squad were in the months following the Christmas Day attacks by the group on the Playstation and Xbox networks. One of them, Julius “Ryan/Zeekill” Kivimäki, got a two-year suspended sentence in a Finnish court in July despite being convicted on over 50,000 counts of fraud and harassment and a previous conviction in 2013 for operating a botnet.

The Lizard Stresser website is currently still up, but the DDoS tool is not available. The site’s homepage carries a statement: “Back online. Full restoration coming soon." A post to the group’s Twitter feed just after the UK arrests were announced claimed that Lizard Stresser v2 “was just run by [Lizard Squad] members and it was good.” So, it may not be long before the group starts launching another round of DDoS attacks.

Listing image by National Park Service

Channel Ars Technica