UGNazi builds DoS tool, takes down HostGator

Powered by SC Magazine
 

Group continues hacking spree.

Prolific hacking group UGNazi has taken down a string of sites including US based HostGator in live tests of a new Denial of Service (DoS) attack tool.

The tool, dubbed #TheHolocaust, targeted undisclosed vulnerabilities and had crippled HostGator in seconds from a machine with 2Gb of Ram, via a 10Mbps/2Mbps link, the group told SC Magazine.

HostGator and payments company wepay.com remained offline this afternoon.

The DoS tool was written in Python and C++ and targeted vulnerabilities that would be easy to patch, group member the ‘Godfather’ said in an email.

“We do not want to show the DOS Tool #TheHolocaust to the public yet as it is in development,” they said.

“It affects the connection of the [targeted] server, as well as the [targeted] webserver.”

UGNazi achieved infamy when it hacked cloud provider WHMCS through a social engineering attack against HostGator.

The alleged perpetrator, member Cosmo, was arrested by the FBI but allegedly told Softpedia that he was released.

UGNazi in a later hack changed the DNS records of image board 4Chan pointing visitors to the hacking group’s Twitter account.

The latter hack was made by accessing the personal Gmail account of CloudFlare’s chief executive Matthew Prince. The DoS protection company said the hackers navigated past Google’s two factor authentication exploiting a now fixed “subtle recovery flaw” and bypassed his AT&T’s voicemail PIN.

UGNazi claimed that hack was worse than what the CloudFlare led on and told Softpedia that they “got into their main server” and accessed customer account information including name, IP address and payment data.

Copyright © SC Magazine, Australia


UGNazi builds DoS tool, takes down HostGator
 
 
 
Top Stories
Parliament passes law to let ASIO tap entire internet
Greens effort to limit devices fails.
 
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1395

Vote