Two Israeli Men Arrested For Running VDoS-s.com DDoS Service


DDoS or Booter services have been around for a while, but VDoS-s.com was a particularly slick (and shameless) one with a content marketing strategy and active social media accounts. Two Israeli men were arrested for running the service after ironically being hacked by a security researcher.

Two Israeli Men Arrested For Running VDoS-s.com DDoS Service

They called their service a ‘Stresser’ and claimed to have up to 216Gbps of bandwidth available (yah that’s a lot, and could take most data centers off-line).

Two Israeli men have been arrested for running a distributed-denial-of service-as-a-service site, after one seemingly claimed to attack the Pentagon.

Itay Huri and Yarden Bidani, released on US$10,000 bonds, were arrested following a tip off from the FBI, local news site TheMarker reports.

A Twitter account using Bidani’s name and handle tweeted last year that parts of the Pentagon site were down after a DDoS.

Their slick DDoS site vDos-s.com charged between US$30 and US$200 a month for DDoS attacks sold as legitimate network stress testing.

“We are not just another booter, we guarantee 10-50Gbps of UDP traffic per stress test using our DNS method, our high end dedicated servers can satisfy even the most power hungry customers,” the pair wrote on their site.


They have also allegedly cashed in over $600,000USD in the past 2 years from running the service, which is some serious coin.

Although, attacking The Pentagon DNS servers was probably a poorly conceived idea.

VDos targeted 150,000 victims according to a stolen database provided to KrebsonSecurity lifted from the site by an anonymous security researcher who exploited a vulnerability.

That database revealed the actors’ identities along with details of paying customers.

The lifted document mentions victim sites including the UK’s Imperial College Model United Nations club, game site GoodGame.co.uk, and anti-DDoS site Zare.com.

KrebsonSecurity says the booter site made some US$600,000 over the last two years.

The pair seemed to have tried to present the company as a legitimate stress testing service, rather than as guns for hire. Customers using the “legitimate stress testing company” are told they “are prohibited from stressing internet connections and/or servers that [they] do not have ownership of or authorisation to test”.

The domain is down now, and both chaps out on bail so I think the idea of them running this as a legitimate stress testing service seems ill-conceived.

It’s pretty impressive what they’ve pulled off in the info in the reports are correct which puts them at 18 years old now, and they have run this service since 2012 which made them 14 years old when they launched a fully formed money making machine (albeit rather illegal).

Source: The Register

Posted in: Legal Issues, Networking Hacking Tools

, ,


Latest Posts:


APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc
GKE Auditor - Detect Google Kubernetes Engine Misconfigurations GKE Auditor – Detect Google Kubernetes Engine Misconfigurations
GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security & dev teams streamline the configuration process
zANTI - Android Wireless Hacking Tool Free Download zANTI – Android Wireless Hacking Tool Free Download
zANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using mobile.
HELK - Open Source Threat Hunting Platform HELK – Open Source Threat Hunting Platform
The Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing etc
trape - OSINT Analysis Tool For People Tracking Trape – OSINT Analysis Tool For People Tracking
Trape is an OSINT analysis tool, which allows people to track and execute intelligent social engineering attacks in real-time.


One Response to Two Israeli Men Arrested For Running VDoS-s.com DDoS Service

  1. kitsune October 2, 2016 at 6:54 am #

    RIP VDOS :(