FBI raids TX-based server hosting business in "Operation Payback" probe

Discuss

15 Responses to “FBI raids TX-based server hosting business in "Operation Payback" probe”

  1. Restless says:

    Probably somebody set up the IRC channel on their already-existing server (or that of their employer). The FBI is probably interested in the IRC server logs to find out who was connected and perhaps the logs of the chat if the server keeps them.

  2. Restless says:

    Actually… given the article on this here, perhaps the IRC channel was being used as a control conduit for the LOIC installs.

    Kiddies, in future, host that stuff outside the US.

  3. Anonymous says:

    #8 so what? I was connected on anonops irc at that time but I didn’t attack paypal, am I a “criminal”? :P

    • BB says:

      Anon

      “#8 so what? I was connected on anonops irc at that time but I didn’t attack paypal, am I a “criminal”? :P”

      I sincerely don’t understand. I give up. I didn’t understand if they were charging the company with a crime, or if they were looking to find others on the server.

  4. Burningsol says:

    This will do nothing, stop no one. The sysadmin’s of the world are in control. operation “payback” its a joke. A puff piece. Calming the nerves of the public that doesn’t understand how the internet really works. You think the person running the bot net on that server was actually there? HA!

  5. Anonymous says:

    What, did they raid Steve Jackson Games again?

  6. Church says:

    This won’t end well.

  7. Anonymous says:

    Another good reason to filter UDP at the edge of your network.

  8. wrwetzel says:

    The asymmetry here is painfully glaring. The FBI goes after the people who attacked PayPal but not those who earlier attacked WikiLeaks.

  9. BB says:

    So, (warning: dumb question here), is there a way that they can distinguish that the attacks actually originated from that server?
    Or could it be that some other ISP location turned the server into a zombie or bot computer? Is there a way to know if someone hacked the computer, or sent a trojan in order to do the attacks?

  10. teflon says:

    Makes you feel good about hosting your data in a ‘secure’ data center. Imagine you’re hosting your (completely unrelated yet private) data in this Texas datacenter the day it gets raided by the FBI.

  11. Restless says:

    It appears that it wasn’t the server itself that was performing the DDoS, it was just hosting the IRC channel for coordination of the attacks.

    • BB says:

      Thanks for that answer. Does “hosting” imply that they were complicit somehow? Or is it that they simply have a business that makes money by “hosting” whatever activity or traffic someone pays them to put through their servers? I’m sorry if I should already know this.

Leave a Reply