Skip to content
Naked Security Naked Security

Lad who attacked Spamhaus in DDoS attack avoids prison, given a second chance

The 16-year-old arrested in 2013 with £72,000 in the bank and the smoke from a DDoS attack against Spamhaus in the air, has been sentenced.

Just over two years ago, we wrote about a massive DDoS attack against Spamhaus.

To explain, Spamhaus is a project that “tracks the internet’s spam senders” for the purpose of publishing blocklists of known spammers, and assisting law enforcement “to identify and pursue spammers worldwide.”

And a DDoS is a Distributed Denial of Service attack, where you abuse lots of computers at the same time to flood someone’s server with purposeless traffic so it can’t keep up.

It’s a bit like getting all your friends to call up a takeaway joint at the same time, sit in the voicemail queue until they get answered, then to dilly-dally over what they want to order…

…before hanging up without buying anything.

The enquiries seem legitimate at first, but generate no business while at the same time keeping genuine callers at the back of a long queue.

Stophaus vs. Spamhaus

Apparently, the attacks against Spamhaus were stirred up in a controversy called Stophaus, in which a countercultural posse of internet users discussed taking out Spamhaus.

The Stophaus schemers, it seems, wanted to teach Spamhaus some kind of lesson for daring to take a stance against spam.

And so they attacked.

DNS servers

The trick they used is called DNS amplification, and it works like this.

DNS is the system that converts (amongst other things) internet names such as www.example.com into internet numbers such as 93.184.216.34.

DNS servers fall into three loose categories:

  • Ones that run on your router at home to service your home network, which simply relay your queries unaltered onwards to your ISP, or some other public server like Google’s well-known 8.8.8.8.
  • Ones that organisations run as their own official DNS servers to give so-called authoritative answers to queries for the domains they own.
  • Ones that will accept your queries, reply immediately if they have the answer cached already, or else recursively (a fancy word for “in their turn”) ask the authoritative servers on your behalf, cache the result for everyone else, and reply to you.

Most recursive servers aren’t public, unlike Google’s 8.8.8.8, because they end up doing a lot of work and carrying a lot of traffic.

So recursive servers are usually restricted to customers of a specific ISP, or to computers inside your company, or some other handily circumscribed set of users.

Or, if they’re open to the public, they are carefully managed to prevent abuse.

DNS abuse

One sort of abuse is to make multiple small requests to a recursive server such that each request provokes a much bigger request-and-reply from the authoritative server belonging to your victim.

Small requests turning into large ones is where the name amplification comes in.

In theory, amplification attacks should be hard to do, because the majority of DNS servers aren’t supposed to be recursive – in other words, they shouldn’t pass on requests willy-nilly to other people’s servers at all.

The problem was, at least when the Stophaus attack was carried out, that lots and lots of home routers – perhaps 20 million or more – were misconfigured to act as full-blown recursive servers for the whole world, as well as plain-old relay servers for the owner’s home network.

So the Spamhaus attackers had millions of misconfigured DNS servers at their disposal that they could use to turn millions of modest and innocent-looking outbound DNS requests from their attack zombies into much larger amounts of DNS request-and-reply traffic, all of it aimed at Spamhaus.

Effects of the attack

According to reports, Spamhaus’s DNS servers were subjected to traffic peaks of 300Gbit/sec, the sort of attack that quickly gets not only disruptive but expensive.

Within a month or so, a 16-year-old was arrested for allegedly taking part in the Stophaus attack scene.

He couldn’t be named, being under 18, but he did put his hand up and plead guilty the following year to a bunch of offences.

At the time, those offences were reported as including money laundering and child abuse, with sentencing deferred until 2015.

Sentenced and named

The guilty party, having now turned 18, has recently been sentenced in Southwark crown court, and named as Seth Nolan Mcdonagh.

It sounds as though he wasn’t just a piracy-loving activist-leaning youngster who fell in with older hacker/cracker types and went along for the ride.

The BBC’s report suggests that Mcdonagh, who went by “narko” online, would take money to attack named websites, making him a sort of DDos gun-for-hire.

In fact, “narko” apparently had £72,000 (then about $105,000) in the bank at the time of the attacks – not a bad nest-egg for a 16-year-old – plus 1000 stolen credit card numbers on his computer.

Nevertheless, the court has given him a chance to reform without going to prison: he’s been sentenced to 240 hours of community service.

Let’s hope Mcdonagh, now legally an adult, takes this as an opportunity, not a lucky escape.

DDoS imagery courtesy of Shutterstock.

8 Comments

I’m sorry the sentence is just like a Mom enabling her child. Oh, poor child, acting like an adult doing adult crime and no real consequence for his actions. They should at least seize all the monies and pay it to the
people who’s credit cards were stolen and to Spamhaus for damages.

Reply

I’m not sure what happened to the money…if it could be shown to be the proceeds of crime, I assume (not sure – anyone from the UK care to comment?) that it would have ended up forfeited to the Crown.

Reply

I don’t know enough about the specifics of the case or about the offender to comment on the sentence, however I will say that the difference between the US sentences, which are crazily over the top, compared with this sentence don’t make any sense.

Reply

240 hours of community service?? He had £72,000 in his bank account for deeds already performed and stolen credit card numbers.

I too don’t have enough knowledge of the case to form an educated opinion. Perhaps those community service hours can be put to good use by partnering with law enforcement to stop the criminal activity or restoring the loses of those attacked.

Reply

Odd no mention here of him Swatting people, trying to get them killed by unwitting police. The lad will suffer and no country or law will help him as he begs for mercy.

Reply

At 16 years old that kid has a lot left to learn. Cut him loose, train him, and make him work for Spamhaus deterring future attacks. He will appreciate more than anything and hopefully learn his lesson.

Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!